ISDS 705 Chapter 13 Already Graded A
ISDS 705 Chapter 13 Already Graded A Breach Vulnerability Personnel issues, technology problems, procedural factors and operational issues all impact firm security, constant vigilance should be part of an individual skill set and a key component in organizational culture Motivation for Information Security Attacks Extortion, espionage, cyberwarfare, terrorism, pranks, protest, revenge, IP theft Data Harvesters Cybercriminals who infiltrate systems and collect data for illegal resale Cash-Out Fraudsters Criminals that purchase assets from data harvesters to be used for illegal financial gain Botnets Surreptitiously infiltrated computers, controlled remotely Distributed Denial of Service (DDoS) Attacks Shutting down websites with a crushing load of seemingly legitimate requests Hackers Someone who breaks into computer systems White Hat Hackers Uncover computer weaknesses without exploiting them. Contribute to improving system security Black Hat Hackers Computer criminals who exploit a system's weakness for personal gain Hacktivists Infiltrate a system and expose information as a protest seeking to make political profit Griefers or Trolls Malicious pranksters Stuxnet A cyber weapon designed to burrow deep into Iran's nuclear enrichment facility at Natanz and damage the nuclear enrichment equipment. It illustrated that critical infrastructure can be destroyed without a single shot Bad Apples Rogue employees who steal secrets, install malware, or hold a firm hostage Social Engineering Con games that trick employees into revealing information or performing other tasks that compromise a firm Phishing Cons executed using technology, in order to acquire sensitive information or trick someone into installing malicious software Spoofed Email transmissions and packets that have been altered to forge or disguise their origin or identity Zero-Day Exploits New attacks that haven't been clearly identified and haven't been incorporated into security screening systems Passwords Key to a document or account: Most users employ inefficient and insecure password systems Biometrics Measure and analyze human body characteristics to identify and authorize Multi-Factor Authentication When identity is proven by presenting more than one item for proof of credentials Malware Seeks to compromise a computing system without permission Viruses Infect other software or files Worms Take advantage of security vulnerability to automatically spread
Written for
- Institution
- ISDS 705 Chapter 13 Already Graded A
- Course
- ISDS 705 Chapter 13 Already Graded A
Document information
- Uploaded on
- April 23, 2024
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
isds 705 chapter 13 already graded a
Also available in package deal