IDS 200 Study Guide - Quiz Guide: Gantt Chart, The Sequence, Exponential Growth

277 views15 pages

Document Summary

Threat a person or organization that seeks to obtain or alter data or other is assets illegally, (cid:449)ithout the o(cid:449)(cid:374)e(cid:396)"s pe(cid:396)(cid:373)issio(cid:374) o(cid:396) knowledge. Vulnerability an opportunity for threats to gain access to individual or organizational assets. Some vulnerabilities exist because there are no safeguards or the existing safeguards are ineffective. Safeguard any action, device, procedure, te(cid:272)h(cid:374)i(cid:395)ue, o(cid:396) othe(cid:396) (cid:373)easu(cid:396)e that (cid:396)edu(cid:272)es a s(cid:455)ste(cid:373)"s vulnerability to a threat. Target the asset that is desired by a security threat. Human error, computer crime, natural events and disasters. Pretexting, phishing, spoofing (ip and email), sniffing, war-drivers, hacking, usurpation* Pretexting deceiving someone over the internet by pretending to be another person or organization. Phishing a technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential information. Spoofing another term for pretending to be someone else.