Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Viruses are programs that infect other software or files and require:
E
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.
D
The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.
The U.S. government contends that hundreds of terrorists have been captured using technology surveillance methods, implying that this surveillance makes the world more secure. The U.S. government claims that safeguards are in place to prevent widespread abuse and these include the need to obtain a warrant from the Foreign Intelligence Surveillance Court (or FISA) when specifically targeting surveillance in the United States.
Those concerned with government surveillance state that no such warrants are required for intercepting communication between U.S.-based persons and "foreign targets," and FISA has rejected only a small number of requests (less than 0.03 percent through 2012). Even if such surveillance programs are well intentioned, risks include having the data fall into the hands of foreign spies, rogue employees, criminals, or unscrupulous government employees. U.S. technology firms have also complained that the actions of surveillance agencies have put them at a disadvantage, with customers looking for alternatives free of the tarnished perception of having (complicity or unwittingly) provided private information to authorities.
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach?
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.
One of the major problems with the Heartbleed bug in OpenSSL software is that:
The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers.
_____ are seemingly tempting, but bogus targets meant to draw hacking attempts.
Online backup services are considered a poor choice for end-users, since this only increases the liklihood that an individual's data will be hacked.
_____ refers to a term that either means breaking into a computer system or a particularly clever solution.
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.
Which of the following statements is consistent with ground realities regarding information security?
According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.
Worms require an executable (a running program) to spread, attaching to other executables.
An attack on the US power grid by terrorists or a foreign power is indicative of:
Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
Describe some of the factors at work that enabled the Target security breach to occur.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)