click below
click below
Normal Size Small Size show me how
Security+ Chap 1
Chapter 1 Intro to Security
Question | Answer |
---|---|
The ability that provides tracking of events. | Accounting |
The act of ensuring that an individual or element is genuine. | Authorization |
An item that has value. | Asset |
The steps that ensure that the individual is who they claim to be. | Authentication |
Security actions that ensure that data is accessible to authorized users. | Availability |
Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information. | Cybercrime |
The first state law that covers any state agency, person or company that does business in California. | California's Database Security Breach Notification Act |
Security actions that ensure only authorized parties can view the information. | Confidentiality |
A network of attackers, identity thieves, spammers, and financial fraudsters. | Cybercriminals |
A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence. | Cyberterrorism |
Attackers whose motivation may be defined as ideology, or attacking for the sake of their principles or beliefs. | Cyberterrorists |
The act of taking advantage of a vulnerability. | Exploiting |
A law that requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information. | Gramm-Leach-Bliley Act (GLBA) |
A term used to refer to a person who uses advanced computer skills to attack computers. | Hacker |
Stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain. | Identity theft |
The tasks of securing information that is in a digital format. | Information security |
Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data. | Integrity |
The likelihood that a threat agent will exploit the vulnerability. | Risk |
A law designed to fight corporate corruption. | Sarbanes-Oxley Act (Sarbox) |
Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so. | Script kiddies |
A person who has been hired to break into a computer and steal information. | Spy |
A type of action that has the potential to cause harm. | Threat |
A person or element that has the power to carry out a threat. | Threat agent |
A flaw or weakness that allows a threat agent to bypass security. | Vulnerability |