Podcast
Questions and Answers
Which category of computer criminals commit business or information sabotage for personal gain?
Which category of computer criminals commit business or information sabotage for personal gain?
What motivates career criminals to use computers in their crimes?
What motivates career criminals to use computers in their crimes?
What is the impact of unauthorized access to computer systems?
What is the impact of unauthorized access to computer systems?
What is an example of industrial espionage?
What is an example of industrial espionage?
Signup and view all the answers
What is a zero-day?
What is a zero-day?
Signup and view all the answers
What is an example of an insider threat?
What is an example of an insider threat?
Signup and view all the answers
What is a common threat to IS security due to employee negligence?
What is a common threat to IS security due to employee negligence?
Signup and view all the answers
What is a type of malicious software that demands payment in exchange for restoring access to data?
What is a type of malicious software that demands payment in exchange for restoring access to data?
Signup and view all the answers
What is a reason why fired employees may pose a threat to an organization's IS security?
What is a reason why fired employees may pose a threat to an organization's IS security?
Signup and view all the answers
What is a risk associated with jailbreaking a mobile device?
What is a risk associated with jailbreaking a mobile device?
Signup and view all the answers
What type of cyber attack is a backup policy designed to protect against?
What type of cyber attack is a backup policy designed to protect against?
Signup and view all the answers
What is a type of attack that involves flooding a system with traffic in order to make it unavailable?
What is a type of attack that involves flooding a system with traffic in order to make it unavailable?
Signup and view all the answers
What is the primary motivation of hacktivist groups like Anonymous?
What is the primary motivation of hacktivist groups like Anonymous?
Signup and view all the answers
What is a risk associated with lost mobile devices without the capability to remotely wipe data?
What is a risk associated with lost mobile devices without the capability to remotely wipe data?
Signup and view all the answers
What is the term for the unauthorized use of a company's internal resources or information by an employee or contractor?
What is the term for the unauthorized use of a company's internal resources or information by an employee or contractor?
Signup and view all the answers
What is the primary purpose of end-to-end encryption?
What is the primary purpose of end-to-end encryption?
Signup and view all the answers
What is the term for the use of cyber attacks to gather sensitive information or disrupt operations for competitive advantage?
What is the term for the use of cyber attacks to gather sensitive information or disrupt operations for competitive advantage?
Signup and view all the answers
What is the term for the process of testing one's own systems to identify vulnerabilities?
What is the term for the process of testing one's own systems to identify vulnerabilities?
Signup and view all the answers