Cybersecurity Threats and Assets

Cybersecurity Threats and Assets

Created by
@FirmerCypress7732

Questions and Answers

What can a computer be in the context of an attack?

Either a subject or an object

What is a threat agent?

A specific instance or component of a threat

What is the term for a weakness or fault in a system or protection mechanism?

Vulnerability

What is an example of a vulnerability?

<p>A flaw in a software package</p> Signup and view all the answers

What is the term for the value of information coming from its characteristics?

<p>Critical characteristics</p> Signup and view all the answers

What is an example of a critical characteristic of information?

<p>Availability</p> Signup and view all the answers

What is a threat in the context of asset protection?

<p>An object, person, or entity that represents a constant anger to an asset</p> Signup and view all the answers

What is the primary purpose of an online registration process for software?

<p>To combat software piracy</p> Signup and view all the answers

What is a type of malware that spreads copies of itself from computer to computer without human interaction?

<p>Worm</p> Signup and view all the answers

What is the term for the ownership of ideas and control over the tangible or virtual representation of those ideas?

<p>Intellectual Property</p> Signup and view all the answers

What is the term for a program designed to damage, destroy, or deny service to a target system?

<p>Malicious Code</p> Signup and view all the answers

What is a type of malware that disguises itself as legitimate software, often using social engineering to trick users into installing it?

<p>Trojan Horse</p> Signup and view all the answers

In which countries were high piracy rates previously suggested?

<p>Singapore, Hong Kong, and Pacific Rim countries</p> Signup and view all the answers

What is a reason for piracy disregard mentioned in the study?

<p>Peer pressure</p> Signup and view all the answers

How did respondents view virus hacking and system abuse?

<p>They universally condemned it</p> Signup and view all the answers

In which countries did participants report intolerant attitudes toward personal use of organization computing resources?

<p>Singapore, Hong Kong, and England</p> Signup and view all the answers

What is notable about the Netherlands in terms of piracy rates?

<p>It ranked third in piracy rates among surveyed nations</p> Signup and view all the answers

What may contribute to the low tolerance for illicit system use?

<p>The similarity to common crimes</p> Signup and view all the answers

What is the primary purpose of adware?

<p>To deliver and display advertising banners or popups to the user’s screen</p> Signup and view all the answers

What is the term for attempting to reverse calculate a password?

<p>Password Crack</p> Signup and view all the answers

What is a back door in the context of computer systems?

<p>A legitimate entry point left by system designers or maintenance staff</p> Signup and view all the answers

What is the main difference between a brute force attack and a dictionary attack?

<p>The use of a list of commonly used passwords</p> Signup and view all the answers

What is the result of a successful denial of service attack?

<p>The system becomes overloaded and cannot respond to legitimate requests</p> Signup and view all the answers

What is the purpose of a spyware?

<p>To aid in gathering information about a person or organization without their knowledge</p> Signup and view all the answers

What is the first commandment of computer ethics?

<p>Thou shalt not use a computer to harm other people</p> Signup and view all the answers

What is the main challenge in determining ethical behavior in computer use across cultures?

<p>Different perspectives on ethics among nationalities</p> Signup and view all the answers

What is the term for using another person's protected intellectual property without permission?

<p>Software license infringement</p> Signup and view all the answers

What is the primary concern of the tenth commandment of computer ethics?

<p>Considering social consequences</p> Signup and view all the answers

In which type of court is copyright infringement typically tried?

<p>Federal court</p> Signup and view all the answers

What is the main focus of the third commandment of computer ethics?

<p>Not snooping around in other people's computer files</p> Signup and view all the answers

More Quizzes Like This

Computer Security and Cyber Security Quiz
5 questions

Computer Security and Cyber Security Quiz

ConsistentTropicalRainforest avatar
ConsistentTropicalRainforest
Cybersecurity and Computer Systems Quiz
11 questions
Network Security Controls
10 questions
Use Quizgecko on...
Browser
Browser