Cybercrimes &
IT Vulnerabilities
IT at Work
Cybersecurity
Defending Against Fraud
Miscellaneous
100
Someone who hacks for a cause and is not motivated by money.
What is hacktivist?
100
Appropriate design of data center, good fire prevention, motion detector alarms are examples of this type of control.
What are physical controls?
100
The property that data or files have not been altered in an unauthorized way
What is integrity?
100
Refers to the deliberate misuse of the assets of one’s employer for personal gain.
What is occupational fraud?
100
Appropriate training, fostering company loyalty, random audits are examples of this type of control.
What is administrative control?
200
The use of an incentive to get users to perform an insecure action.
What is baiting?
200
A control where a fingerprint scan or retinal scan is used as a means of access.
What are biometric controls?
200
Human Error, Environmental Hazards, Computer System Failures are examples of these.
What is unintentional threats?
200
Intelligent Analysis/Anomaly Detection is an example of protection from this type of fraud.
What is internal fraud?
200
Missing documents is an example of an internal control which may be an indication of this.
What is internal fraud?
300
97% of _____________ are avoidable and do not require hackers to possess special skills, resources or customization.
What is data breaches?
300
A type of control where you use a swipe card to gain access to a facility.
What is access control?
300
A major challenge largely due to the many ways an employee can carry out malicious activity.
What is internal threat?
300
This plan is also know as the disaster recover plan.
What is business continuity plan?
300
The plan outlines the process by which businesses should recover from a major disaster.
What is business continuity plan?
400
the most dangerous cyber attack
What is APT (advanced persistent threat)?
400
A control that indicates locking a cellphone at work is not a means of security.
What are communication network controls?
400
A collection of computers infected by software robots.
What is botnet?
400
Data that is stored on files that are unencrypted is an example of this.
What is Endpoint security and control?
400
Password, patches, and firewalls are examples of these.
What is Types of Hardware and Software Defenses?
500
Vital systems and assets, physical and virtual.
What is critical infrastructure?
500
An objective of a defense security where steps are taken to detect fraud.
What is detection?
500
Make data and documents available and accessible 24/7 while simultaneously restricting access, promote secure and legal sharing of information among authorized persons and partners, and insure compliance with government regulations and laws are examples of this.
What is cybersecurity?
500
Prevention and deterrence, detection, containment, recovery, correction, awareness and compliance are objectives of this type of strategy.
What is defense strategy?
500
A four step system where if one defense layer fails, another layer provides protection.
What is Cybersecurity defense-in-depth model?
M
e
n
u