Those Who Would Do Harm
Information Security Basics
Regulations & Defense
100

This type of threat actor attempts to sell their knowledge of a vulnerability to  other attackers or governments

Broker

100

The 3 protections that Information Security seeks to provide, making up C.I.A., are what?

Confidentiality, Integrity, Availability

100

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

HIPAA

200

What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?

Nation State Actors

200

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

Integrity

200

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

Gramm-Leach-Bliley

300

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?

Advanced Persistent Threat

300

Which of the following ensures that data is accessible to authorized users?

Availability

300

Script Kiddies, Hactivists, Nation State Actors, Insiders, Competitors and Brokers are all examples of what?

Threat Actors

400

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

Script Kiddies

400

Which of the three protections ensures that only authorized parties can view information?

Confidentiality

400

What type of diversity is being implemented if a company is using multiple security products from different manufacturers?

Vendor Diversity

500

What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?

Hactivists

500

What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents?

Cyberterrorism

500

Name any 1 of the 5 fundamental security principles that should be implement to defend against attacks.

Layering, Limiting, Diversity, Obscurity, or Simplicity