Podcast
Questions and Answers
Increasing complexity in devices and equipment decreases vulnerability.
Increasing complexity in devices and equipment decreases vulnerability.
False
IT organizations must perform ongoing security assessments to deal with new risks.
IT organizations must perform ongoing security assessments to deal with new risks.
True
BYOD policy does not allow employees to use their own mobile devices to access company computing resources.
BYOD policy does not allow employees to use their own mobile devices to access company computing resources.
False
Commercial software never has known vulnerabilities.
Commercial software never has known vulnerabilities.
Signup and view all the answers
An exploit is a software patch that fixes a vulnerability.
An exploit is a software patch that fixes a vulnerability.
Signup and view all the answers
A zero-day attack occurs after the security community or software developer becomes aware of and repairs a vulnerability.
A zero-day attack occurs after the security community or software developer becomes aware of and repairs a vulnerability.
Signup and view all the answers
A black hat hacker is someone who violates computer or Internet security for illegal personal gain or maliciously
A black hat hacker is someone who violates computer or Internet security for illegal personal gain or maliciously
Signup and view all the answers
A cybercriminal is an individual who captures trade secrets to gain an unfair competitive advantage
A cybercriminal is an individual who captures trade secrets to gain an unfair competitive advantage
Signup and view all the answers
A hacktivist is someone who attempts to destroy government infrastructure, financial institutions, and other corporations
A hacktivist is someone who attempts to destroy government infrastructure, financial institutions, and other corporations
Signup and view all the answers
A malicious insider is an individual who violates computer or Internet security maliciously or for illegal personal gain
A malicious insider is an individual who violates computer or Internet security maliciously or for illegal personal gain
Signup and view all the answers
A cracker is an individual who causes problems, steals data, and corrupts systems
A cracker is an individual who causes problems, steals data, and corrupts systems
Signup and view all the answers
Study Notes
Computer Incident Prevalence
- Increasing complexity of devices and equipment leads to a growing number of network entry points, increasing security risks.
- Expanding and changing systems introduce new risks, requiring IT organizations to:
- Keep up with technological change
- Perform ongoing security assessments
- Implement approaches for dealing with new risks
BYOD (Bring Your Own Device) Policy
- A business policy that permits employees to use their own mobile devices to access company computing resources.
- Increasing prevalence of BYOD policies increases security risks.
Vulnerabilities and Attacks
- Commercial software with known vulnerabilities can be exploited.
- Exploit: An attack that takes advantage of a particular system vulnerability to infiltrate and initiate a denial-of-service (DoS) attack or install malware, such as spyware.
- Zero-day attack: A type of attack that takes place before the security community or software developer becomes aware of and repairs a vulnerability.
Classification of Perpetrators of Computer Crime
- Black Hat Hacker: Violates computer or Internet security maliciously or for illegal personal gain.
- Cracker: Causes problems, steals data, and corrupts systems.
- Malicious Insider: An employee or contractor who attempts to gain financially and/or disrupt a company's information systems.
- Industrial Spy: Captures trade secrets to gain an unfair competitive advantage.
- Cybercriminal: Attacks a computer system for financial gain.
- Hacktivist: Promotes a political ideology through malicious cyber activities.
- Cyberterrorist: Attempts to destroy government infrastructure, financial institutions, and other corporations, utilities, and emergency response units.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers the prevalence of computer incidents, increasing security risks due to growing network entry points, and the importance of ongoing security assessments.