12 Questions
What is the term for malicious code that captures information like web browsing habits and usernames?
Spyware
What is the term for a person who creates and uses malware to gain unauthorized access to information?
Hacker
What type of security protects physical objects or areas from unauthorized access and misuse?
Physical security
How do malware that infect computers through files often spread?
All of the above
What is the term for a part of multiple layers of security that protects the details of a particular operation or series of activities?
Operations security
Which of the following is NOT a component of information security?
Operations security
What type of malware is designed to record every keystroke made on a computer?
Keyloggers
What is the primary goal of information security?
To protect confidentiality of information assets
What is the term for the protection of information assets from unauthorized access or disclosure?
Confidentiality
What is the term for the process of identifying, estimating, and prioritizing risks to organizational operations?
Risk assessment
What type of malware is typically spread through email attachments?
Malware through spam emails
What is the term for the unauthorized access or use of information assets?
Access
Study Notes
Types of Malware
- Malware consists of segments of code that perform malicious actions
- Types of malware include: Virus, Worm, Spyware, Trojan, Ransomware, and Bot
Security Layers
- Multiple layers of security include: Physical security, Personnel security, Network security, and Information security
- These layers protect objects, areas, or individuals from unauthorized access and misuse
Information Security
- Information security is the protection of information assets that use, store, or transmit information
- It involves the application of policy, education, and technology to protect confidentiality, integrity, and availability of information assets
Security Risks
- Risk assessment is the process of identifying, estimating, and prioritizing risks to organizational operations
- Risk analysis is the determination of the extent to which an organization's information assets are exposed or at risk
Threats and Attacks
- A threat is a category of objects, persons, or other entities that presents a danger to an asset
- An attack is an intentional or unintentional act that can cause damage to information and the systems that support it
Preventing Malware
- Ways to prevent malware infections include:
- Regularly updating software
- Avoiding file sharing services and BitTorrent
- Being cautious with removable media
- Avoiding spam emails
Key Concepts
- Confidentiality is the protection of information from disclosure or exposure to unauthorized individuals or systems
- Availability is the ability of authorized users to access information without interference or obstruction
- Keyloggers are a type of surveillance software that records every keystroke made to a log file, usually encrypted
This quiz covers different types of malware, including viruses, worms, and spyware, as well as cybersecurity threats and terms related to hacking and illegal access to information.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free