• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Three sources of security threats
1. Human error and mistakes
2. malicious human activity
3. Natural events and disatsters
Unauthorized data disclosure
can occur by human error when someone inadvertly releases data in violation of policy
Pretextng
when someone deceives by pretending to be someone else
phishing
a technique for obtaining unauthorized data that uses pretexting via email
spoofing
another term for someone pretending to be someone else.
IP spoofing
when an intruder uses another site's IP address as of to were that other site.
Sniffing
a technique for intercepting computer communications
drive-by snifers
take computers with wireless connections through an area and search for unprotected wireless networks
hacking
a form of inccorect data modificaton. occurs when a person gains unauthorized access to a computer system
faulty service
includes problems that result becuase of incorrect system operation
usurpation
occurs when unauthorized programs invade a computer system and replace legitimate programs
denial of service
human error in following procedures or a lack of procedures
denial of service attacks
can be launched maliciously
loss of infastructure
-can be human accidents.
ex. terrorist and theft
-can also be natural disasters
ex. fire, flood, earthquake
Three components of security program
1. senior management involvement
2. safegaurds of various kinds
3. incident response