click below
click below
Normal Size Small Size show me how
Security+ Chap 1
Chapter 1 Intro to Security
| Question | Answer |
|---|---|
| The ability that provides tracking of events. | Accounting |
| The act of ensuring that an individual or element is genuine. | Authorization |
| An item that has value. | Asset |
| The steps that ensure that the individual is who they claim to be. | Authentication |
| Security actions that ensure that data is accessible to authorized users. | Availability |
| Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information. | Cybercrime |
| The first state law that covers any state agency, person or company that does business in California. | California's Database Security Breach Notification Act |
| Security actions that ensure only authorized parties can view the information. | Confidentiality |
| A network of attackers, identity thieves, spammers, and financial fraudsters. | Cybercriminals |
| A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence. | Cyberterrorism |
| Attackers whose motivation may be defined as ideology, or attacking for the sake of their principles or beliefs. | Cyberterrorists |
| The act of taking advantage of a vulnerability. | Exploiting |
| A law that requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information. | Gramm-Leach-Bliley Act (GLBA) |
| A term used to refer to a person who uses advanced computer skills to attack computers. | Hacker |
| Stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain. | Identity theft |
| The tasks of securing information that is in a digital format. | Information security |
| Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data. | Integrity |
| The likelihood that a threat agent will exploit the vulnerability. | Risk |
| A law designed to fight corporate corruption. | Sarbanes-Oxley Act (Sarbox) |
| Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so. | Script kiddies |
| A person who has been hired to break into a computer and steal information. | Spy |
| A type of action that has the potential to cause harm. | Threat |
| A person or element that has the power to carry out a threat. | Threat agent |
| A flaw or weakness that allows a threat agent to bypass security. | Vulnerability |