Matching
Match the following terms to the appropriate definitions.
Premises:
a person who has been hired to break into a computer and steal information
intended to cause panic, provoke violence, or result in a financial catastrophe
an event or action that might defeat security measures in place and result in a loss
plans and policies established by an organization to ensure that people correctly use the products
a weakness that allows a threat agent to bypass security
the likelihood that a threat agent will exploit a vulnerability
something that has value
to take advantage of a vulnerability
a person or thing that has the power to carry out a threat
Responses:
asset
risk
exploit
procedures
threat agent
threat
vulnerability
computer spy
cyberterrorism
Correct Answer:
Premises:
Responses:
a person who has been hired to break into a computer and steal information
intended to cause panic, provoke violence, or result in a financial catastrophe
an event or action that might defeat security measures in place and result in a loss
plans and policies established by an organization to ensure that people correctly use the products
a weakness that allows a threat agent to bypass security
the likelihood that a threat agent will exploit a vulnerability
something that has value
to take advantage of a vulnerability
a person or thing that has the power to carry out a threat
Premises:
a person who has been hired to break into a computer and steal information
intended to cause panic, provoke violence, or result in a financial catastrophe
an event or action that might defeat security measures in place and result in a loss
plans and policies established by an organization to ensure that people correctly use the products
a weakness that allows a threat agent to bypass security
the likelihood that a threat agent will exploit a vulnerability
something that has value
to take advantage of a vulnerability
a person or thing that has the power to carry out a threat
Responses:
Related Questions
Q8: The _ Act requires banks and financial
Q35: What is the maximum fine for those
Q38: _ is focused on protecting the valuable
Q39: Targeted attacks against financial networks, unauthorized access
Q40: Briefly describe computer spies.
Q44: List three of the federal and state
Q46: List and describe two of the four
Q50: Describe the security principle of simplicity.
Q50: Describe script kiddies.
Q408: What is a hacker?
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents