hc hc hc hc hc
ons study guide verified 100%
hc hc hc hc
Securityhc-hccorrecthcanswers-
Thehcdegreehcofhcprotectionhcagainsthccriminalhcactivity,hcdanger,hcdamage,hcand/orhcloss
InformationhcSecurityhc-hccorrecthcanswers-
protectinghcorganizationshcinformationhcresourceshcfromhcunauthorizedhcaccess,hcuse,hcdisclo
sure,hcdisruption,hcmodification,hcorhcdestruction
Threathc-hccorrecthcanswers-anyhcdangerhctohcwhichhcahcsystemhcmayhcbehcexposed
Exposurehc-hccorrecthcanswers-
thehcharm,hclosshcorhcdamagehcthathccanhcresulthcifhcahcthreathccompromiseshcthathcresource
Vulnerabilityhc-hccorrecthcanswers-
thehcpossibilityhcthathcthehcsystemhcwillhcsufferhcharmhcbyhcahcthreat
Factorshccontributinghctohcvulnerabilityhc-hccorrecthcanswers--
interconnected,hcinterdependent,hcwirelesslyhcnetworkedhcbusinesshcenvironment
-smaller,hcfaster,hccheaperhccomputershcandhcstoragehcdevices
-decreasinghcskillshcnecessaryhctohcbehcahccomputerhchacker
-internationalhcorganizedhccrimehctakinghcoverhccyberhccrime
-Lackhcofhcmanagementhcsupport
UnintentionalhcThreatshc-hccorrecthcanswers-
actshcperformedhcwithouthcmalicioushcintenthcthathcneverthelesshcrepresenthcahcserioushcthreathc
tohcinformationhcsecurity
SocialhcEngineeringhc-hccorrecthcanswers-
attackerhcuseshcsocialhcskillshctohctrickhcahclegitimatehcemployeehcintohcprovidinghcconfidentialhcc
ompanyhcinfohcsuchhcashcpasswords
TwohcHighesthcAreashcforhcThreatshc-hccorrecthcanswers-HR
IS
HumanhcErrorhc-hccorrecthcanswers--CarelessnesshcwithhcLaptops
-CarelessnesshcwithhcComputinghcDevices
-Openinghcquestionablehcemail
, -Carelesshcinternethcsurfing
-Poorhcpasswordhcselection/use
-Carelessnesshcwithhcone'shcoffice
-Carelessnesshcusinghcunmanagedhcdevices
-Carelessnesshcwithhcdiscardedhcequipment
-Carelesshcmonitoringhcofhcenvironmentalhchazards
CarelessnesshcWithhcLaptopshc-hccorrecthcanswers-
losinghcorhcmisplacinghclaptops,hcleavinghcthemhcinhctaxis,hcetc
CarelessnesshcwithhcComputinghcDeviceshc-hccorrecthcanswers-
losinghcorhcmisplacement,hcusinghcthemhccarelesslyhcsohcthathcmalwarehcishcintroducedhcintohcan
hcorganizationshcnetwork
OpeninghcQuestionablehcEmailhc-hccorrecthcanswers-
Openinghcemailshcfromhcsomeonehcunknown,hcorhcclickinghconhclinkshcembeddedhcinhcemails
CarelesshcInternethcSurfinghc-hccorrecthcanswers-
accessinghcquestionablehcwebsites,hccanhcresulthcinhcmalwarehcand/orhcalienhcsoftwarehcbeinghc
introduced
PoorhcPasswordhcSelection/Usehc-hccorrecthcanswers-
choosinghcandhcusinghcweakhcpasswords
CarelessnesshcwithhcOne'shcOfficehc-hccorrecthcanswers-
leavinghcdeskshcandhcfilinghccabinetshcunlockedhcwhenhcemployeeshcgohchomehcathcnight,hcnothcl
ogginghcoffhcthehccompanyhcnetworkhcwhenhcleavinghcthehcofficehcforhcanhcextendedhcperiodhcofhct
ime
CarelesshcUsinghcUnmanagedhcDeviceshc-hccorrecthcanswers-
unmanagedhcdeviceshcarehcthosehcoutsidehcthehccontrolhcofhcthehcorganization'shcIThcdepartme
nthcandhccompanyhcsecurityhcprocedures
-
computershcbelonginghctohccustomershcandhcbusinesshcpartners,hcbusinesshccentershcathchotel
s,hcetc.
CarelessnesshcwithhcDiscardedhcEquipmenthc-hccorrecthcanswers-
discardinghcoldhccomputerhchardwarehcandhcdeviceshcwithouthccompletelyhcwipinghcthehcmemor
y
CarelesshcMonitoringhcofhcEnvironmentalhcHazardshc-hccorrecthcanswers-
dust,hcdirt,hchumidityhcarehcharmfulhctohcthehcoperationhcofhcthehccomputinghcequipment
DeliberatehcThreatshctohcIShc-hccorrecthcanswers--Espionagehcorhctrespass