Deck 26: Data Breaches

Full screen (f)
exit full mode
Question
A(n)________ is said to happen when an unauthorized person views,alters,or steals secured data.

A)data breach
B)asynchronous communication
C)key escrow
D)sequence flow
Use Space or
up arrow
down arrow
to flip the card.
Question
Explain how data breach occurs with an example.
Question
________ refers to a software used by hackers to take advantage of a newly discovered vulnerability in a target's application or operating system.

A)Exploit
B)Attack vector
C)Data breach
D)Wardriver
Question
An exploit is a type of attack vector used by hackers.
Question
Spear phishing is used by organizations to monitor traffic passing through their internal network.
Question
Personally identifiable information includes a person's bank account numbers,personal identification numbers,email address,and social security numbers.
Question
Explain how hackers use information stolen from data breaches for credit card forgery.
Question
A group of hackers decide to steal credit card details of the users of Swift Shopping Inc. ,a leading e-commerce company.They infect the security system of the company's third-party vendor and gain access into its internal network.They compromise an internal Windows server of the company and use a malware to extract customer data.Which of the following is illustrated in this scenario?

A)hardening
B)carding
C)pretexting
D)data breaching
Question
A group of hackers use a targeted phishing attack to breach a company's firewalls and hack into its security system.Which of the following techniques have the hackers used?

A)pretexting
B)IP spoofing
C)spear phishing
D)phone phishing
Question
Sam is a hacker who makes money by stealing and selling credit cards.He has targeted the employees of a local firm and is looking for details such as names,addresses,dates of birth,social security numbers,credit card numbers,or health records.In this case,Sam is looking for ________.

A)firewall security measures
B)business continuity plans
C)malware definitions
D)personally identifiable information
Question
Which of the following is true of the measures to be taken by an organization in the event of a data breach?

A)The organization must delay informing its users so that the occurrence of data breach remains private.
B)The organization must not involve additional technical or law enforcement professional as it may lead to further damage to its data.
C)The organization must destroy the evidence of the breach to avoid future security problems.
D)The organization must respond quickly to mitigate the amount of damage hackers can do with the stolen data.
Question
Stolen credit card information is validated through a process called carding.
Question
Which of the following is a direct cost of handling a data breach?

A)loss of reputation
B)abnormal customer turnover
C)legal fees and consultation
D)increased customer acquisition activities
Question
The process of illegally transferring data out of an organization is known as ________.

A)exfiltrating
B)carding
C)hardening
D)pretexting
Question
Attack vectors refer to the ways hackers attack a target.
Question
Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.
Question
According to the reports in Ponemon's 2014 Cost of Data Breach Study,the average costs per stolen record were the highest in the ________ industry.

A)transportation
B)advertising
C)automobile
D)healthcare
Question
________ refers to the process of placing a small charge on a credit card to ensure it is working.

A)Hoarding
B)Carding
C)Phishing
D)Credit card hijacking
Question
According to the reports in Ponemon's 2014 Cost of Data Breach Study,organizations are more likely to lose larger amounts of data than smaller amounts of data.
Question
The first step in protecting oneself from data breaches is ________.

A)securing credit and debit card details
B)understanding how they happen
C)learning the technologies used for these activities
D)installing necessary software to protect from possible breaches
Question
The purpose of a business continuity planning session in an organization is to ________.

A)discuss how to return the organization to normal operations as quickly as possible after a data breach
B)build plans to increase the market presence of the organization and increase its user base
C)identify new markets that will accelerate the growth of the organization
D)understand the type of information stored by the organization and implement relevant security measures as required by regulatory laws
Question
Data breach notifications to users should include ________.

A)the costs incurred due to the breach
B)a sincere apology and an acceptance of responsibility for the incident
C)a detail on how the breach occurred and the reasons for the breach
D)a report on the current security measures
Question
What are the steps involved in an organization's plan for a data breach?
Question
The Gramm-Leach-Bliley Act (GLBA)is a universal regulatory law that applies to all types of industries.
Question
Why should organizations respond quickly to data breaches?
Question
Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards.
Question
Despite data breach,organizations should refrain from informing their users immediately as it will lead to mass user defection.
Question
Data extrusion helps organizations secure their data from possible data breaches.
Question
The Federal Information Security Management Act (FISMA)details the procedures to be followed by a federal agency in case an organization fails to ensure the minimum security requirements for its data and systems.
Question
Adam owns and manages a large insurance company.In order to protect his organization from data breach,Adam has to ensure that he has incorporated the security measures required by the ________.

A)Family Educational Rights and Privacy Act (FERPA)
B)Federal Information Security Management Act (FISMA)
C)Payment Card Industry Data Security Standard (PCI DSS)
D)Gramm-Leach-Bliley Act (GLBA)
Question
Which of the following regulatory laws requires data protection for health care institutions?

A)the Gramm-Leach-Bliley Act (GLBA)
B)the Federal Information Security Management Act (FISMA)
C)the Health Information Portability and Accountability Act (HIPAA)
D)the Health Maintenance Organization Act of 1973
Question
Which of the following regulatory laws requires data protection for financial institutions?

A)the Family Educational Rights and Privacy Act (FERPA)
B)the Federal Information Security Management Act (FISMA)
C)the Gramm-Leach-Bliley Act (GLBA)
D)the Health Information Portability and Accountability Act (HIPAA)
Question
Performing a walkthrough should be done as part of a business continuity planning session.
Question
Venclave Hospital is a privately-owned organization that specializes in treating neurological diseases.Which of the following regulatory laws governs the data security measures to be taken by this hospital for protecting against data breach?

A)the Health Maintenance Organization Act of 1973
B)the Health Information Portability and Accountability Act (HIPAA)
C)the Gramm-Leach-Bliley Act (GLBA)
D)the Federal Information Security Management Act (FISMA)
Question
Decisions on how to respond to a data breach are most effective if they are made when the breach is happening.
Question
Data breach notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future.
Question
Executives,managers,and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs.They identify areas that would need immediate attention and assign specific responsibilities to each employee.The employees of the organization are performing a(n)________.

A)exfiltration
B)documentation
C)walkthrough
D)case study
Question
The ________ is a regulatory law that requires security precautions for government agencies.

A)Federal Information Security Management Act (FISMA)
B)Gramm-Leach-Bliley Act (GLBA)
C)Payment Card Industry Data Security Standard (PCI DSS)
D)Family Educational Rights and Privacy Act (FERPA)
Question
Which of the following should be done by employees to protect against data breaches?

A)They should develop new exploits.
B)They should remove existing honeypots.
C)They should design methods for data extrusion.
D)They should conduct a walkthrough.
Question
The ________ is a regulatory law that provides protection for student education records.

A)Family Educational Rights and Privacy Act (FERPA)
B)Equal Educational Opportunities Act of 1974
C)Smith-Lever Act of 1914
D)Federal Information Security Management Act (FISMA)
Question
An organization can easily stop a simple SQL injection attack on its online store by additional user training,stronger vendor authentication,or an internal network intrusion detection system.
Question
A(n)________ is used to examine traffic passing through an organization's internal network.

A)honeypot
B)attack vector
C)security protocols open repository
D)network intrusion detection system
Question
Talgedco Inc. ,a software company,has taken several steps to secure its systems and data.The company has also installed a network intrusion detection system and data loss prevention system.Employees of this company have also been trained on the procedures to be followed to reduce the probability of a data breach.These steps taken by Talgedco are an example of ________.

A)attack vectors
B)countermeasures
C)malware
D)exfiltration
Question
It is easier for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly.
Question
Organizations can implement countermeasures that make data breaches impossible to occur.
Question
________ are software or procedures used to prevent an information security attack.

A)Malware definitions
B)Countermeasures
C)Exploits
D)Attack vectors
Question
What are countermeasures? Why is it important for organizations to implement countermeasures?
Question
List some of the regulatory laws that govern the secure storage of data in certain industries.
Question
________ are countermeasures designed to prevent sensitive data from being released to unauthorized persons.

A)Malware definitions
B)Attack vectors
C)Data loss prevention systems
D)Data extrusion prevention systems
Question
Explain the basic countermeasures to be taken by organizations to protect themselves against data breaches.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 26: Data Breaches
1
A(n)________ is said to happen when an unauthorized person views,alters,or steals secured data.

A)data breach
B)asynchronous communication
C)key escrow
D)sequence flow
A
2
Explain how data breach occurs with an example.
Hackers are continually developing new tools and techniques that enable them to steal more data.They experiment with new attack vectors,or ways of attacking a target.In the data breach that occurred at Target Corporation in late 2013,attackers first purchased malware designed specifically for the attacks they planned to carry out.They then used spear phishing,or a targeted phishing attack,to infect a Target third party vendor's system and gather keystrokes,login credentials,and screenshots from the vendor's users.The attackers used this information to gain access into Target's internal network.Once inside Target's network,the attackers compromised an internal Windows file server.From this server,the attackers used malware named Trojan.POSRAM to extract customer data from point-of-sale (POS)terminals.Customer data was continuously sent from the POS terminals to an extraction server within Target's network.It was then funneled out of Target's network to drop servers in Russia,Brazil,and Miami.From there,the data was collected and sold on the black market.
3
________ refers to a software used by hackers to take advantage of a newly discovered vulnerability in a target's application or operating system.

A)Exploit
B)Attack vector
C)Data breach
D)Wardriver
A
4
An exploit is a type of attack vector used by hackers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Spear phishing is used by organizations to monitor traffic passing through their internal network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Personally identifiable information includes a person's bank account numbers,personal identification numbers,email address,and social security numbers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Explain how hackers use information stolen from data breaches for credit card forgery.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A group of hackers decide to steal credit card details of the users of Swift Shopping Inc. ,a leading e-commerce company.They infect the security system of the company's third-party vendor and gain access into its internal network.They compromise an internal Windows server of the company and use a malware to extract customer data.Which of the following is illustrated in this scenario?

A)hardening
B)carding
C)pretexting
D)data breaching
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A group of hackers use a targeted phishing attack to breach a company's firewalls and hack into its security system.Which of the following techniques have the hackers used?

A)pretexting
B)IP spoofing
C)spear phishing
D)phone phishing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Sam is a hacker who makes money by stealing and selling credit cards.He has targeted the employees of a local firm and is looking for details such as names,addresses,dates of birth,social security numbers,credit card numbers,or health records.In this case,Sam is looking for ________.

A)firewall security measures
B)business continuity plans
C)malware definitions
D)personally identifiable information
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is true of the measures to be taken by an organization in the event of a data breach?

A)The organization must delay informing its users so that the occurrence of data breach remains private.
B)The organization must not involve additional technical or law enforcement professional as it may lead to further damage to its data.
C)The organization must destroy the evidence of the breach to avoid future security problems.
D)The organization must respond quickly to mitigate the amount of damage hackers can do with the stolen data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Stolen credit card information is validated through a process called carding.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is a direct cost of handling a data breach?

A)loss of reputation
B)abnormal customer turnover
C)legal fees and consultation
D)increased customer acquisition activities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The process of illegally transferring data out of an organization is known as ________.

A)exfiltrating
B)carding
C)hardening
D)pretexting
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Attack vectors refer to the ways hackers attack a target.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
According to the reports in Ponemon's 2014 Cost of Data Breach Study,the average costs per stolen record were the highest in the ________ industry.

A)transportation
B)advertising
C)automobile
D)healthcare
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
________ refers to the process of placing a small charge on a credit card to ensure it is working.

A)Hoarding
B)Carding
C)Phishing
D)Credit card hijacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
According to the reports in Ponemon's 2014 Cost of Data Breach Study,organizations are more likely to lose larger amounts of data than smaller amounts of data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The first step in protecting oneself from data breaches is ________.

A)securing credit and debit card details
B)understanding how they happen
C)learning the technologies used for these activities
D)installing necessary software to protect from possible breaches
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
The purpose of a business continuity planning session in an organization is to ________.

A)discuss how to return the organization to normal operations as quickly as possible after a data breach
B)build plans to increase the market presence of the organization and increase its user base
C)identify new markets that will accelerate the growth of the organization
D)understand the type of information stored by the organization and implement relevant security measures as required by regulatory laws
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Data breach notifications to users should include ________.

A)the costs incurred due to the breach
B)a sincere apology and an acceptance of responsibility for the incident
C)a detail on how the breach occurred and the reasons for the breach
D)a report on the current security measures
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
What are the steps involved in an organization's plan for a data breach?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The Gramm-Leach-Bliley Act (GLBA)is a universal regulatory law that applies to all types of industries.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Why should organizations respond quickly to data breaches?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Despite data breach,organizations should refrain from informing their users immediately as it will lead to mass user defection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Data extrusion helps organizations secure their data from possible data breaches.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The Federal Information Security Management Act (FISMA)details the procedures to be followed by a federal agency in case an organization fails to ensure the minimum security requirements for its data and systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Adam owns and manages a large insurance company.In order to protect his organization from data breach,Adam has to ensure that he has incorporated the security measures required by the ________.

A)Family Educational Rights and Privacy Act (FERPA)
B)Federal Information Security Management Act (FISMA)
C)Payment Card Industry Data Security Standard (PCI DSS)
D)Gramm-Leach-Bliley Act (GLBA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following regulatory laws requires data protection for health care institutions?

A)the Gramm-Leach-Bliley Act (GLBA)
B)the Federal Information Security Management Act (FISMA)
C)the Health Information Portability and Accountability Act (HIPAA)
D)the Health Maintenance Organization Act of 1973
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following regulatory laws requires data protection for financial institutions?

A)the Family Educational Rights and Privacy Act (FERPA)
B)the Federal Information Security Management Act (FISMA)
C)the Gramm-Leach-Bliley Act (GLBA)
D)the Health Information Portability and Accountability Act (HIPAA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Performing a walkthrough should be done as part of a business continuity planning session.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Venclave Hospital is a privately-owned organization that specializes in treating neurological diseases.Which of the following regulatory laws governs the data security measures to be taken by this hospital for protecting against data breach?

A)the Health Maintenance Organization Act of 1973
B)the Health Information Portability and Accountability Act (HIPAA)
C)the Gramm-Leach-Bliley Act (GLBA)
D)the Federal Information Security Management Act (FISMA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Decisions on how to respond to a data breach are most effective if they are made when the breach is happening.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Data breach notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Executives,managers,and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs.They identify areas that would need immediate attention and assign specific responsibilities to each employee.The employees of the organization are performing a(n)________.

A)exfiltration
B)documentation
C)walkthrough
D)case study
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The ________ is a regulatory law that requires security precautions for government agencies.

A)Federal Information Security Management Act (FISMA)
B)Gramm-Leach-Bliley Act (GLBA)
C)Payment Card Industry Data Security Standard (PCI DSS)
D)Family Educational Rights and Privacy Act (FERPA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following should be done by employees to protect against data breaches?

A)They should develop new exploits.
B)They should remove existing honeypots.
C)They should design methods for data extrusion.
D)They should conduct a walkthrough.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The ________ is a regulatory law that provides protection for student education records.

A)Family Educational Rights and Privacy Act (FERPA)
B)Equal Educational Opportunities Act of 1974
C)Smith-Lever Act of 1914
D)Federal Information Security Management Act (FISMA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
An organization can easily stop a simple SQL injection attack on its online store by additional user training,stronger vendor authentication,or an internal network intrusion detection system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
A(n)________ is used to examine traffic passing through an organization's internal network.

A)honeypot
B)attack vector
C)security protocols open repository
D)network intrusion detection system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Talgedco Inc. ,a software company,has taken several steps to secure its systems and data.The company has also installed a network intrusion detection system and data loss prevention system.Employees of this company have also been trained on the procedures to be followed to reduce the probability of a data breach.These steps taken by Talgedco are an example of ________.

A)attack vectors
B)countermeasures
C)malware
D)exfiltration
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
It is easier for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Organizations can implement countermeasures that make data breaches impossible to occur.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
________ are software or procedures used to prevent an information security attack.

A)Malware definitions
B)Countermeasures
C)Exploits
D)Attack vectors
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What are countermeasures? Why is it important for organizations to implement countermeasures?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List some of the regulatory laws that govern the secure storage of data in certain industries.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
________ are countermeasures designed to prevent sensitive data from being released to unauthorized persons.

A)Malware definitions
B)Attack vectors
C)Data loss prevention systems
D)Data extrusion prevention systems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Explain the basic countermeasures to be taken by organizations to protect themselves against data breaches.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.