Exam 27: Data Breaches
Attack vectors refer to the ways hackers attack a target.
True
A group of hackers use a targeted phishing attack to breach a company's firewalls and hack into its security system. Which of the following techniques have the hackers used?
C
List some of the regulatory laws that govern the secure storage of data in certain industries.
Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards. A few prominent regulatory laws that govern the secure storage of data in certain industries are listed below.
1. The Federal Information Security Management Act (FISMA) requires security precautions for government agencies.
2. The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services Modernization Act, requires data protection for financial institutions.
3. The Health Information Portability and Accountability Act (HIPAA) requires data protection for health care institutions.
4. The Payment Card Industry Data Security Standard (PCI DSS) governs the secure storage of cardholder data.
5. The Family Educational Rights and Privacy Act (FERPA) provides protection for student education records.
Adam owns and manages a large insurance company. In order to protect his organization from data breach, Adam has to ensure that he has incorporated the security measures required by the ________.
Data breach notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future.
According to the reports in Ponemon's 2014 Cost of Data Breach Study, organizations are more likely to lose larger amounts of data than smaller amounts of data.
Organizations can implement countermeasures that make data breaches impossible to occur.
The ________ is a regulatory law that requires security precautions for government agencies.
Talgedco Inc., a software company, has taken several steps to secure its systems and data. The company has also installed a network intrusion detection system and data loss prevention system. Employees of this company have also been trained on the procedures to be followed to reduce the probability of a data breach. These steps taken by Talgedco are an example of ________.
Bob, a hacker, encountered a vulnerability in a bank's firewall when he was trying to hack into its Web site. Which of the following can Bob use to take advantage of this liability?
The ________ is a regulatory law that provides protection for student education records.
The Gramm-Leach-Bliley Act (GLBA) is a universal regulatory law that applies to all types of industries.
Jobs Dot Com, an online recruitment site, was hacked into, and personal information of a number of users was stolen. What information should Jobs Dot Com include in its data breach notification to its users?
Personally identifiable information includes a person's bank account numbers, personal identification numbers, email address, and social security numbers.
Explain the basic countermeasures to be taken by organizations to protect themselves against data breaches.
Spear phishing is used by organizations to monitor traffic passing through their internal network.
Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.
A(n) ________ is used to examine traffic passing through an organization's internal network.
Sam is a hacker who makes money by stealing and selling credit cards. He has targeted the employees of a local firm and is looking for details such as names, addresses, dates of birth, social security numbers, credit card numbers, or health records. In this case, Sam is looking for ________.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)