Computer Security Risks
11 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Increasing complexity in devices and equipment decreases vulnerability.

False

IT organizations must perform ongoing security assessments to deal with new risks.

True

BYOD policy does not allow employees to use their own mobile devices to access company computing resources.

False

Commercial software never has known vulnerabilities.

<p>False</p> Signup and view all the answers

An exploit is a software patch that fixes a vulnerability.

<p>False</p> Signup and view all the answers

A zero-day attack occurs after the security community or software developer becomes aware of and repairs a vulnerability.

<p>False</p> Signup and view all the answers

A black hat hacker is someone who violates computer or Internet security for illegal personal gain or maliciously

<p>True</p> Signup and view all the answers

A cybercriminal is an individual who captures trade secrets to gain an unfair competitive advantage

<p>False</p> Signup and view all the answers

A hacktivist is someone who attempts to destroy government infrastructure, financial institutions, and other corporations

<p>False</p> Signup and view all the answers

A malicious insider is an individual who violates computer or Internet security maliciously or for illegal personal gain

<p>False</p> Signup and view all the answers

A cracker is an individual who causes problems, steals data, and corrupts systems

<p>True</p> Signup and view all the answers

Study Notes

Computer Incident Prevalence

  • Increasing complexity of devices and equipment leads to a growing number of network entry points, increasing security risks.
  • Expanding and changing systems introduce new risks, requiring IT organizations to:
    • Keep up with technological change
    • Perform ongoing security assessments
    • Implement approaches for dealing with new risks

BYOD (Bring Your Own Device) Policy

  • A business policy that permits employees to use their own mobile devices to access company computing resources.
  • Increasing prevalence of BYOD policies increases security risks.

Vulnerabilities and Attacks

  • Commercial software with known vulnerabilities can be exploited.
  • Exploit: An attack that takes advantage of a particular system vulnerability to infiltrate and initiate a denial-of-service (DoS) attack or install malware, such as spyware.
  • Zero-day attack: A type of attack that takes place before the security community or software developer becomes aware of and repairs a vulnerability.

Classification of Perpetrators of Computer Crime

  • Black Hat Hacker: Violates computer or Internet security maliciously or for illegal personal gain.
  • Cracker: Causes problems, steals data, and corrupts systems.
  • Malicious Insider: An employee or contractor who attempts to gain financially and/or disrupt a company's information systems.
  • Industrial Spy: Captures trade secrets to gain an unfair competitive advantage.
  • Cybercriminal: Attacks a computer system for financial gain.
  • Hacktivist: Promotes a political ideology through malicious cyber activities.
  • Cyberterrorist: Attempts to destroy government infrastructure, financial institutions, and other corporations, utilities, and emergency response units.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz covers the prevalence of computer incidents, increasing security risks due to growing network entry points, and the importance of ongoing security assessments.

Use Quizgecko on...
Browser
Browser