ITM100 CHAPTER 8 QUIZ

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of malware can be transmitted to a smartphone without user intervention?

  • Worm (correct)
  • Adware
  • Trojan horse
  • Spyware

Which mobile operating system is targeted by most hackers according to the text?

  • Windows Mobile
  • iOS
  • BlackBerry OS
  • Android (correct)

What is the reported increase in malicious mobile malware attacks from 2017 to 2018 according to Kaspersky Lab?

  • 125%
  • 75%
  • 50%
  • 100% (correct)

Which social networking site is mentioned as a conduit for malware in the text?

<p>LinkedIn (C)</p> Signup and view all the answers

What percentage of the world's spam is delivered by botnets?

<p>90% (A)</p> Signup and view all the answers

Which type of attack involved the Mirai botnet in October 2016?

<p>DDoS (D)</p> Signup and view all the answers

What is the average annualized cost of cybercrime security for organizations in 2018?

<p>$13 million (A)</p> Signup and view all the answers

Which type of computer crime involves gaining unauthorized access?

<p>Phishing (C)</p> Signup and view all the answers

What is a major concern that prevents many companies from reporting computer crimes?

<p>Fear of reputational damage (D)</p> Signup and view all the answers

What type of attack involves activities of malicious insiders?

<p>DDoS attacks (D)</p> Signup and view all the answers

In 2019, what were the fraud losses in the United States due to identity theft?

<p>$16.9 billion (B)</p> Signup and view all the answers

Which phishing technique involves redirecting users to a bogus web page by gaining access to Internet address information?

<p>Pharming (D)</p> Signup and view all the answers

What is the primary goal of phishing?

<p>Obtaining personal data (A)</p> Signup and view all the answers

Which attack involves infecting computers with bot malware to open a back door for attackers to give instructions?

<p>Botnet (A)</p> Signup and view all the answers

What type of attack involves launching a DDoS attack against Dyn in October 2016?

<p>DDoS (A)</p> Signup and view all the answers

What is the primary concern for small and midsize businesses with less protected networks in relation to DDoS attacks?

<p>Financial damage (D)</p> Signup and view all the answers

Which type of attack involves misrepresenting oneself through fake email addresses or redirecting web links to steal sensitive information?

<p>Spoofing (D)</p> Signup and view all the answers

What type of malware appears benign but performs unexpected actions, allowing the introduction of viruses or malicious code?

<p>Trojan horse (C)</p> Signup and view all the answers

What type of attack exploits vulnerabilities in web application software to introduce malicious code into a company’s systems?

<p>SQL injection (A)</p> Signup and view all the answers

Which type of attack floods network servers with false communications to crash the network?

<p>Denial-of-service (DoS) attacks (A)</p> Signup and view all the answers

What type of attack extorts money by taking control of computers and encrypting data?

<p>Ransomware (B)</p> Signup and view all the answers

What serves advertising and monitors user web-surfing activity, with keyloggers being a particularly nefarious type?

<p>Spyware (A)</p> Signup and view all the answers

Which type of attack involves unauthorized access to computer systems, and criminal hackers, or crackers, engage in theft, system damage, and cybervandalism?

<p>Hackers (B)</p> Signup and view all the answers

What involves using numerous computers to overwhelm the network with false communications?

<p>Distributed denial-of-service (DDoS) attacks (C)</p> Signup and view all the answers

Which type of malware steals banking login credentials and infected 3.6 million computers in 2009?

<p>ZeuS (Zbot) Trojan (A)</p> Signup and view all the answers

What type of attack can steal proprietary information from networks when used for criminal purposes?

<p>Sniffers (D)</p> Signup and view all the answers

What poses security challenges from devices, platforms, communications, and connected systems?

<p>The Internet of Things (IoT) (D)</p> Signup and view all the answers

What is needed to protect IoT devices and platforms from information attacks and physical tampering, and to encrypt their communications?

<p>New security tools (A)</p> Signup and view all the answers

What is the average cost of a data breach among 507 surveyed companies globally, according to the 2019 Cost of a Data Breach Report?

<p>$3.92 million (C)</p> Signup and view all the answers

When did the U.S. Congress address computer crime threats?

<p>1986 (B)</p> Signup and view all the answers

What is the main focus of cyberwarfare?

<p>Penetrating computers or networks to cause damage and disruption (A)</p> Signup and view all the answers

Which entities are considered targets of cyberwarfare?

<p>Military, power grids, financial systems, and communication networks (A)</p> Signup and view all the answers

What did foreign hackers steal from the United States?

<p>Source code, blueprints, and plans for critical infrastructure (C)</p> Signup and view all the answers

Which countries are reported to be developing offensive cyberattack capabilities?

<p>Russia, China, Iran, and North Korea (A)</p> Signup and view all the answers

What is the role of the U.S. Cyber Command?

<p>Coordinates and directs operations and defense of Department of Defense information networks (B)</p> Signup and view all the answers

What does cyberwarfare pose a serious threat to?

<p>Infrastructure of modern societies, including major financial, health, government, and industrial institutions (C)</p> Signup and view all the answers

What is a significant cause of network security breaches according to the text?

<p>User lack of knowledge (C)</p> Signup and view all the answers

How might employees inadvertently compromise systems?

<p>Forgetting passwords or falling victim to social engineering tactics (A)</p> Signup and view all the answers

What may failure to comply with legal and regulatory requirements for electronic records management lead to?

<p>Costly litigation (B)</p> Signup and view all the answers

What is the primary focus of the Sarbanes-Oxley Act of 2002?

<p>Ensuring the accuracy and integrity of financial information (A)</p> Signup and view all the answers

What is the main focus of disaster recovery planning?

<p>Restoration of disrupted computing and communications services (C)</p> Signup and view all the answers

What is the purpose of business continuity planning?

<p>Restoring business operations after a disaster (A)</p> Signup and view all the answers

What is the goal of business impact analysis?

<p>Identifying critical systems and determining the maximum amount of downtime (B)</p> Signup and view all the answers

What do information systems audits primarily examine?

<p>The firm’s security environment and controls (C)</p> Signup and view all the answers

What is the main focus of audits in relation to Sarbanes-Oxley?

<p>Internal controls to govern the creation and documentation of financial information (C)</p> Signup and view all the answers

What is the purpose of using duplicate computer centers or cloud-based disaster recovery services?

<p>Restoring computing and communications services (D)</p> Signup and view all the answers

What is the focus of PricewaterhouseCoopers LLP (PwC) UK's business continuity plans?

<p>Providing resilient and recoverable operations in the event of crises (B)</p> Signup and view all the answers

What is the primary purpose of an information systems audit?

<p>Examine the firm’s security environment and controls (A)</p> Signup and view all the answers

What is the main goal of business impact analysis?

<p>Identify critical systems and determine the maximum amount of time the business can survive with its systems down (D)</p> Signup and view all the answers

What is the primary purpose of disaster recovery planning?

<p>Restore disrupted computing and communications services (C)</p> Signup and view all the answers

What is the main focus of business continuity planning?

<p>Restore business operations after a disaster (A)</p> Signup and view all the answers

Flashcards

Average Cost of a Data Breach (2019)

The average cost of a data breach in 2019 among 507 surveyed companies globally was $3.92 million.

Computer Fraud and Abuse Act

A U.S. law passed in 1986 that makes unauthorized access to computer systems illegal.

Cyberwarfare

State-sponsored activities designed to cripple and defeat other nations by infiltrating their computers or networks to cause damage and disruption.

Cyberwarfare Targets

Military, power grids, financial systems, and communication networks are all potential targets of cyberwarfare.

Signup and view all the flashcards

Non-State Actors in Cyberwarfare

Non-state actors like terrorists or criminal groups can also engage in cyberwarfare.

Signup and view all the flashcards

Theft of Critical Infrastructure Information

Foreign hackers have stolen vital information like source code, blueprints, and plans for critical infrastructure from the U.S.

Signup and view all the flashcards

Cyberattack Capabilities

Intelligence reports suggest over 30 countries, including Russia, China, Iran, and North Korea, are developing offensive cyberattack capabilities.

Signup and view all the flashcards

U.S. Cyber Command

The U.S. Cyber Command coordinates and directs operations and defense of Department of Defense information networks and prepares for military cyberspace operations.

Signup and view all the flashcards

Cyberwarfare Threat to Infrastructure

Cyberwarfare poses a significant threat to the infrastructure of modern societies, including their major financial, health, government, and industrial institutions.

Signup and view all the flashcards

Insider Threats

Insiders, such as employees with access to company systems, pose a major threat to cybersecurity due to their insider knowledge and potential for misuse.

Signup and view all the flashcards

User Lack of Knowledge

Employee lack of knowledge, such as forgetting passwords or falling victim to social engineering, is a major cause of network security breaches.

Signup and view all the flashcards

Electronic Records Management Regulations

Companies must comply with legal and regulatory requirements for managing electronic records, such as GDPR in the EU, to avoid costly litigation.

Signup and view all the flashcards

HIPAA (Health Information Security)

HIPAA (Health Insurance Portability and Accountability Act) outlines security and privacy rules for healthcare data, including privacy, security, and electronic transaction standards.

Signup and view all the flashcards

Gramm-Leach-Bliley Act (Financial Data Security)

The Gramm-Leach-Bliley Act requires financial institutions to ensure the security and confidentiality of customer data, including storage and transmittal.

Signup and view all the flashcards

Sarbanes-Oxley Act (Financial Transparency)

Sarbanes-Oxley Act focuses on protecting investors in public companies by ensuring the accuracy and integrity of financial information.

Signup and view all the flashcards

Sarbanes-Oxley & Information Systems Security

Sarbanes-Oxley focuses on internal controls to govern the creation and documentation of financial information, including information systems security and controls.

Signup and view all the flashcards

Disaster Recovery Planning

Disaster recovery planning focuses on restoring disrupted computing and communications services.

Signup and view all the flashcards

Business Continuity Planning

Business continuity planning focuses on restoring business operations after a disaster.

Signup and view all the flashcards

Disaster Recovery Methods

Companies use various methods for disaster recovery, including duplicate computer centers, cloud-based services, and spare computers.

Signup and view all the flashcards

Identifying Critical Business Processes

Business continuity plans identify critical business processes and action plans for handling mission-critical functions if systems go down.

Signup and view all the flashcards

Business Impact Analysis

Business impact analysis determines the maximum amount of time a business can survive with its systems down, identifying critical systems.

Signup and view all the flashcards

Information Systems Audits

Information systems audits examine the firm’s security environment and controls, trace the flow of transactions, and may simulate an attack or disaster to test the response.

Signup and view all the flashcards

Control Weaknesses Assessment

Audits identify and rank control weaknesses, estimating their likelihood and assessing their financial and organizational impacts.

Signup and view all the flashcards

UK Records Management Regulations

The UK regulations such as the Records Management Code of Practice for Health and Social Care and the Companies Act 2006, impose specific requirements for managing records and corporate governance.

Signup and view all the flashcards

Compliance with Regulations

Companies need to comply with various regulations to manage their electronic records and ensure data security.

Signup and view all the flashcards

PwC UK Business Continuity Plans

PwC UK has developed business continuity plans to provide resilient and recoverable operations in the event of crises.

Signup and view all the flashcards

Identifying Critical Systems

To understand the potential impact of a security breach, companies need to identify critical systems and assess their importance.

Signup and view all the flashcards

Study Notes

Cybersecurity and Cyberwarfare Threats

  • The 2019 Cost of a Data Breach Report found that the average cost of a data breach among 507 surveyed companies globally was $3.92 million.
  • The U.S. Congress addressed computer crime threats in 1986 with the Computer Fraud and Abuse Act, making unauthorized computer system access illegal.
  • European nations and most U.S. states have similar laws addressing computer crimes.
  • Cyberwarfare involves state-sponsored activities designed to cripple and defeat other nations by penetrating their computers or networks to cause damage and disruption.
  • Cyberwarfare targets include military, power grids, financial systems, and communication networks, and can be conducted by nonstate actors such as terrorists or criminal groups.
  • Foreign hackers have stolen source code, blueprints, and plans for critical infrastructure from the United States.
  • U.S. intelligence reports that over 30 countries are developing offensive cyberattack capabilities, including Russia, China, Iran, and North Korea.
  • The U.S. Cyber Command coordinates and directs operations and defense of Department of Defense information networks and prepares for military cyberspace operations.
  • Cyberwarfare poses a serious threat to the infrastructure of modern societies, including their major financial, health, government, and industrial institutions that rely on the Internet for daily operations.
  • Insiders pose serious security problems for businesses, with user lack of knowledge being the greatest cause of network security breaches.
  • Employees may inadvertently compromise systems by forgetting passwords or falling victim to social engineering tactics.
  • Companies face legal and regulatory requirements for electronic records management, such as the General Data Protection Regulation (GDPR) in the EU, and failure to comply may lead to costly litigation.

Information Security Regulations and Auditing

  • HIPAA (Health Insurance Portability and Accountability Act) of 1996 outlines security and privacy rules for healthcare data, including privacy, security, and electronic transaction standards.
  • The U.S. Financial Services Modernization Act (Gramm-Leach-Bliley Act) requires financial institutions to ensure the security and confidentiality of customer data, including storage and transmittal.
  • The Sarbanes-Oxley Act of 2002 is designed to protect investors in public companies by ensuring the accuracy and integrity of financial information.
  • In the UK, regulations such as the Records Management Code of Practice for Health and Social Care and the Companies Act 2006 impose specific requirements for managing records and corporate governance.
  • Sarbanes-Oxley focuses on internal controls to govern the creation and documentation of financial information, requiring consideration of information systems security and controls.
  • Disaster recovery planning focuses on the restoration of disrupted computing and communications services, while business continuity planning focuses on restoring business operations after a disaster.
  • Firms may use duplicate computer centers, cloud-based disaster recovery services, or firms providing spare computers for emergency backup.
  • Business continuity plans identify critical business processes and action plans for handling mission-critical functions if systems go down.
  • PricewaterhouseCoopers LLP (PwC) UK has developed business continuity plans to provide resilient and recoverable operations in the event of crises.
  • Business impact analysis is conducted to identify critical systems and determine the maximum amount of time the business can survive with its systems down.
  • Information systems audits examine the firm’s security environment and controls, trace the flow of transactions, and may simulate an attack or disaster to test the response.
  • Audits list and rank control weaknesses, estimating the probability of their occurrence and assessing financial and organizational impacts.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Cybersecurity Best Practices
10 questions

Cybersecurity Best Practices

FlawlessBagpipes9804 avatar
FlawlessBagpipes9804
Cybersecurity Threats and Campaigns
9 questions
Use Quizgecko on...
Browser
Browser