Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
11 Cards in this Set
- Front
- Back
Vulnerability
|
Weakness that could be triggered accidentally or exploited intentionally to cause a security breacg
|
|
Threat
|
The potential for a threat-source (something or someone that may trigger a vulnerability accidentally or exploit intentionally) to exercise a vulnerability
|
|
Risk
|
The likelihood and impact (or consequence) of a threat-source exercising a vulnerability
|
|
Control
|
A system or procedure put in place to mitigate risk
|
|
Name four sources of threats
|
Natural disaster, human (external and insider), environmental
|
|
Malicious insider
|
Attacks launched by organization's own staff
|
|
Social Engineering
|
Refers to getting users to reveal confidential information
|
|
Impersonation
|
Pretending to be someone else (social engineering technique)
|
|
Dumpster Diving
|
Combing through an organization's (or individual's) refuse to try to find useful documents (or even files stored on discarded removable media)
|
|
Shoulder surfing
|
Stealing password or PIN (or other secure information) by watching user type it
|
|
Tailgating or piggybacking
|
Entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint
|