This type of threat actor attempts to sell their knowledge of a vulnerability to other attackers or governments
Broker
The 3 protections that Information Security seeks to provide, making up C.I.A., are what?
Confidentiality, Integrity, Availability
Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?
HIPAA
What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?
Nation State Actors
Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
Integrity
Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?
Gramm-Leach-Bliley
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?
Advanced Persistent Threat
Which of the following ensures that data is accessible to authorized users?
Availability
Script Kiddies, Hactivists, Nation State Actors, Insiders, Competitors and Brokers are all examples of what?
Threat Actors
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?
Script Kiddies
Which of the three protections ensures that only authorized parties can view information?
Confidentiality
What type of diversity is being implemented if a company is using multiple security products from different manufacturers?
Vendor Diversity
What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?
Hactivists
What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents?
Cyberterrorism
Name any 1 of the 5 fundamental security principles that should be implement to defend against attacks.
Layering, Limiting, Diversity, Obscurity, or Simplicity