Random seemingly unrelated facts, numbers, words or statistics.
What is Data?
Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....
What is Defense in Depth?
To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.
What is Access Control?
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.
What is a browser? (or web browser)
Data which is more sensitive than publicly available data and will cause harm if disclosed by unauthorized persons
What is classified data?
The list of computers, laptops, software, equipment owned by an organization.
What is Inventory?
An identifier that uniquely tracks actions to individuals.
What is an Account? (or Login ID)
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is Insider threat?
Easily readable programs that automate or provide extra function on a computer system or in an application or browser. ActiveX and JavaScript are examples of this type of language.
What is Scripting? (or Scripting Code or Scripting Language)
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
The use of personality, inowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
Functional managers manage the internal and external communications infrastructure of an organization.
Who are Network Managers?
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Who are organized crime groups?
The top layer of the TCP/IP protocol stack
What is application layer?
The collection of all information used to define a person or entity.
What is Identity Information?
30-50% of all data loss due to the people already within the organization.
What is Insider Threat?
A kind of attack which prevents the usage of a service by overloading the service with excessive requests.
What is Denial of Service?
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
What is state sponsored hacking?
The contents of electronic documents that can carry out or trigger actions automatically, on a computer platform, without the intervention of a user. Includes built in macro processing, scripting languages, or virtual machines. A significant share of today’s malware involves this type of programs.
What is Active Content?
A data describing data.
What is Metadata?
An electronic means of securing access to a facility or part of a facility through biological identification.
What is Biometric Access Control?
It is a word or phrase that verifies that you and only you had access to the account.
What is a Password?
The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.
The user
The Internet standards are specified through the series of documents known with this name.
What is Request for Comments (RFC)?