Term
As security is increased, convenience is often increased. |
|
Definition
|
|
Term
In information security, what can constitute a loss?
|
|
Definition
ALL OF THE ABOVE
Theft of information
a delay in transmitting information that results in a financial penalty
the loss of good will or a reputation |
|
|
Term
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network? |
|
Definition
|
|
Term
One of the challenges in combating cyberterrorism is that many of the prime targets are not owned and managed by the federal government. |
|
Definition
|
|
Term
Select the term that best describes automated attack software? |
|
Definition
|
|
Term
Smart phones give the owner of the device the ability to download security updates. |
|
Definition
|
|
Term
Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses. |
|
Definition
|
|
Term
The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information. |
|
Definition
|
|
Term
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack? |
|
Definition
|
|
Term
Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data. |
|
Definition
|
|