BIT - Impact, prevention, and management of threats

Subdecks (6)

Cards (57)

  • User access restriction:
    Physical security (locks)
    Passwords
    Settings and levels of access
    Biometrics
    2fa
  • 3 examples of 2FA
    Verification email
    Google authenticator
    Security question
  • Ethical hackers are referred to as
    White-hat - hired by company
    Grey-hat - not hired but will tell issues found for a price
  • Penetration testing is an example of what?
    Weakness finding
  • Disaster recovery policy is a plan to limit the damage when a disaster occurs
  • What two techniques do cloud services try and make systems more secure?

    2 factor authentication
    Send notification when file is uploaded
  • Why might data be less secure when stored using cloud services?

    Data is available through the internet
  • In the context of a disaster recovery policy, what does disaster mean?
    Damage to any servers
  • One way to avoid phishing is by having employees check the email to see if it is correct
    Another way is to have a blackmail list
  • Possible impacts of security breach include:
    Damage to public image
    Financial and data loss
    Reduction in productivity
    Downtime
    Legal action