• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
Vulnerability
Weakness that could be triggered accidentally or exploited intentionally to cause a security breacg
Threat
The potential for a threat-source (something or someone that may trigger a vulnerability accidentally or exploit intentionally) to exercise a vulnerability
Risk
The likelihood and impact (or consequence) of a threat-source exercising a vulnerability
Control
A system or procedure put in place to mitigate risk
Name four sources of threats
Natural disaster, human (external and insider), environmental
Malicious insider
Attacks launched by organization's own staff
Social Engineering
Refers to getting users to reveal confidential information
Impersonation
Pretending to be someone else (social engineering technique)
Dumpster Diving
Combing through an organization's (or individual's) refuse to try to find useful documents (or even files stored on discarded removable media)
Shoulder surfing
Stealing password or PIN (or other secure information) by watching user type it
Tailgating or piggybacking
Entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint