Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
Three sources of security threats
|
1. Human error and mistakes
2. malicious human activity 3. Natural events and disatsters |
|
Unauthorized data disclosure
|
can occur by human error when someone inadvertly releases data in violation of policy
|
|
Pretextng
|
when someone deceives by pretending to be someone else
|
|
phishing
|
a technique for obtaining unauthorized data that uses pretexting via email
|
|
spoofing
|
another term for someone pretending to be someone else.
|
|
IP spoofing
|
when an intruder uses another site's IP address as of to were that other site.
|
|
Sniffing
|
a technique for intercepting computer communications
|
|
drive-by snifers
|
take computers with wireless connections through an area and search for unprotected wireless networks
|
|
hacking
|
a form of inccorect data modificaton. occurs when a person gains unauthorized access to a computer system
|
|
faulty service
|
includes problems that result becuase of incorrect system operation
|
|
usurpation
|
occurs when unauthorized programs invade a computer system and replace legitimate programs
|
|
denial of service
|
human error in following procedures or a lack of procedures
|
|
denial of service attacks
|
can be launched maliciously
|
|
loss of infastructure
|
-can be human accidents.
ex. terrorist and theft -can also be natural disasters ex. fire, flood, earthquake |
|
Three components of security program
|
1. senior management involvement
2. safegaurds of various kinds 3. incident response |