Podcast
Questions and Answers
What is the primary reason for implementing strict security measures for assets?
What is the primary reason for implementing strict security measures for assets?
Which of the following is NOT considered an asset in information security?
Which of the following is NOT considered an asset in information security?
What is the term used to describe activities intended to gain unauthorized access to assets?
What is the term used to describe activities intended to gain unauthorized access to assets?
Which of the following is an example of a data breach, as mentioned in the text?
Which of the following is an example of a data breach, as mentioned in the text?
Signup and view all the answers
What is the term used to refer to components of a computer and the data stored in it?
What is the term used to refer to components of a computer and the data stored in it?
Signup and view all the answers
What does the term 'RISK' refer to in the context of cyber threats?
What does the term 'RISK' refer to in the context of cyber threats?
Signup and view all the answers
Which category of THREATS include actions like sabotage and espionage?
Which category of THREATS include actions like sabotage and espionage?
Signup and view all the answers
What type of attack involves sending a large number of messages to a target system to exhaust its resources?
What type of attack involves sending a large number of messages to a target system to exhaust its resources?
Signup and view all the answers
Which type of malware does not require an application to spread across a system?
Which type of malware does not require an application to spread across a system?
Signup and view all the answers
In the context of cybersecurity, what is the purpose of a Protocol Analyzer (Sniffer)?
In the context of cybersecurity, what is the purpose of a Protocol Analyzer (Sniffer)?
Signup and view all the answers
What type of attack involves intercepting communication between two parties without their knowledge?
What type of attack involves intercepting communication between two parties without their knowledge?
Signup and view all the answers
What is the primary goal of a Black Hat Hacker?
What is the primary goal of a Black Hat Hacker?
Signup and view all the answers
Which of the following activities is considered a Security Breach?
Which of the following activities is considered a Security Breach?
Signup and view all the answers
What is the primary responsibility of a White Hat Hacker?
What is the primary responsibility of a White Hat Hacker?
Signup and view all the answers
Which of the following assets does Information Assurance and Security aim to protect?
Which of the following assets does Information Assurance and Security aim to protect?
Signup and view all the answers
What is the primary characteristic of a Grey Hat Hacker?
What is the primary characteristic of a Grey Hat Hacker?
Signup and view all the answers
What is the primary goal of a Cracker?
What is the primary goal of a Cracker?
Signup and view all the answers
What is the primary function of a Trojan Horse malware?
What is the primary function of a Trojan Horse malware?
Signup and view all the answers
What is the purpose of a rootkit?
What is the purpose of a rootkit?
Signup and view all the answers
Which of the following actions can spyware perform?
Which of the following actions can spyware perform?
Signup and view all the answers
Which countermeasure is NOT mentioned for preventing or curing malware?
Which countermeasure is NOT mentioned for preventing or curing malware?
Signup and view all the answers
What is the primary function of a firewall?
What is the primary function of a firewall?
Signup and view all the answers
Which of the following actions is NOT mentioned as a countermeasure against malware?
Which of the following actions is NOT mentioned as a countermeasure against malware?
Signup and view all the answers
Study Notes
Assets in Information Security
- Refers to any pieces of information, devices, or parts related to them that support business activities.
- Includes components of a computer and/or the data stored in it.
- Should be put under strict security measures to prevent losses to the organization.
Types of Threats
- Disclosed Threats: sabotage and espionage.
- Unauthorized Threats: modification made exceeding the policy that has been agreed upon (Unauthorized Changes).
- Denial or Destruction Threats: DoS and/or DDoS.
Types of Active Threats
- Birthday Attacks.
- Brute-force password attacks.
- Dictionary password attacks.
- IP addressing Spoofing.
- Hijacking.
- Replay attacks.
- Man-In-The-Middle attacks.
- Masquerading.
- Social Engineering.
- Phishing.
- Phreaking.
Malware Classification
- Virus: contaminates a program and causes it to be copied to other computers.
- Worm: duplicates and sends itself to other hosts without any user intervention.
- Trojan Horse: hides in a useful program, collects sensitive info, and may open backdoors into computers.
- Rootkit: a group of software that gains unauthorized access to a machine and hides its existence.
- Spyware: targets confidential data, scans, snoops, and installs another spyware.
Countermeasures Against Malware
- Training events for users.
- Regular updates and bulletins about malwares.
- Evaluating new programs or quarantining files on a computer.
- Purchasing and installing anti-malware software and scanning files regularly.
- Using comprehensive login credentials.
- Firewall: inspects network traffic and denies or permits traffic depending on protocols.
Security Breaches
- Refers to any action that would result in a violation of any rules of the CIA.
- Caused by activities such as:
- Attack through Denial of Service (DoS).
- Distributed denial-of-service (DDoS).
- Unacceptable Web Browsing.
- Wiretapping.
- Backdoors.
- Data Modifications.
Assets to be Protected by Information Assurance and Security
- Customer Data.
- IT and Network Infrastructure.
- Intellectual Property.
- Finances and Financial Data.
- Service Availability and Productivity.
- Reputation.
Types of Hackers
- Black Hat Hackers: bypass security measures of a network and create malware to gain access to systems.
- White Hat Hackers: use their skills to do good, checking and finding vulnerabilities in a company's system.
- Grey Hat Hackers: combination of ethical and unethical hackers.
Crackers
- Someone who violates/breaks the security of remote machines and gets unauthorized access to vital data, depriving the original user/owner.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz focuses on the objectives of identifying assets, vulnerabilities, threats, and controls in governance and risk management. Learn about the importance of securing assets in information security to prevent potential risks and threats.