Information security frameworks
/architectures that are required by agencies that regulate the industry.
When might an industry specific security framework or architecture be required for a company?
When might an industry-specific security framework or architecture be required for a company?
The company’s industry is regulated
. You just studied 90 terms!
Which Act requires banks and financial institutions to alert their customers of their policies?
Gramm-Leach-Bliley (GLBA)
demands that banks and financial institutions should notify customers about their policies in revealing customer information and to safeguard all electronic and paper documents holding personally identifiable financial information. Hence option (b) is the correct answer.
Which tool is most commonly associated with state actors?
Ransomware
is the most commonly used tool of nation-state cybercriminals.
What are industry standard frameworks and reference architectures?
Industry-standard frameworks and reference architectures refer
to conceptual blueprints that help to define the structure and operation of IT systems
. They help align IT and security with an organization’s business strategy. Frameworks are more generic than architectures.
What are industry standard frameworks and reference architectures that are required by external agencies known as quizlet?
Information security frameworks
/architectures that are required by agencies that regulate the industry. Information security frameworks/architectures that are not required.
What is it called when a user makes a typing error when entering a URL that takes him to an imposter website?
what is it called when a user makes a typing error when entering a URL that takes him to an imposter website?
Typo squatting
.
What is System security explain?
System security
encompasses all facets of accessing information assets
. From authentication, to software updates, anti-virus protection, and modifications – security is a key component to a device operating at its optimum. These best practices help to mitigate various security concerns.
How is encryption done?
- Symmetric encryption uses a single password to encrypt and decrypt data.
- Asymmetric encryption uses two keys for encryption and decryption. A public key, which is shared among users, encrypts the data. A private key, which is not shared, decrypts the data.
What is network security and its types?
Network Security
protects your network and data from breaches, intrusions and other threats
. … Network Security involves access control, virus and antivirus software, application security, network analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN encryption and more.
Confidentiality ensures that computer-related assets are accessed only by authorized parties. …
Integrity
means that assets can be modified only by authorized parties or only in authorized ways. In this context, modification includes writing, changing, changing status, deleting, and creating.
Is a flaw or weakness that allows a threat agent to bypass security?
Term Definition | threat liklihood the probability that a threat will actually occur | threat vector the means by which an attack could occur | transference transferring the risk to a third party | vulnerability a flaw or weakness that allows a threat agent to bypass security. |
---|
Which type of malware requires a user to transport it from one computer to another?
A requires a user to transport it from one computer to another.
A computer virus
is destructive code that tries to replicate itself on the same computer. A virus cannot automatically advance to other computers; it relies upon a user for its endurance. Hence, option (c) is the correct answer.
What is the term used for a threat actor who controls multiple bots in a botnet quizlet?
RAT. What is the term used for a threat actor who controls multiple bots in a botnet?
cyber-robot
.
rogue IRC
.
bot herder
.
What can constitute a loss?
- theft of information.
- a delay in transmitting information that results in a financial penalty.
- the loss of good will or a reputation.
- all of the above.
Why do Cyberterrorists target power plants?
Cyber terrorists choose sectors like banking industry, power plants, air traffic control centers, and water systems as desirable targets
because they can significantly disrupt the normal activities of a large population
.