BIT - Impact, prevention, and management of threats

    Subdecks (6)

    Cards (57)

    • User access restriction:
      Physical security (locks)
      Passwords
      Settings and levels of access
      Biometrics
      2fa
    • 3 examples of 2FA
      Verification email
      Google authenticator
      Security question
    • Ethical hackers are referred to as
      White-hat - hired by company
      Grey-hat - not hired but will tell issues found for a price
    • Penetration testing is an example of what?
      Weakness finding
    • Disaster recovery policy is a plan to limit the damage when a disaster occurs
    • What two techniques do cloud services try and make systems more secure?

      2 factor authentication
      Send notification when file is uploaded
    • Why might data be less secure when stored using cloud services?

      Data is available through the internet
    • In the context of a disaster recovery policy, what does disaster mean?
      Damage to any servers
    • One way to avoid phishing is by having employees check the email to see if it is correct
      Another way is to have a blackmail list
    • Possible impacts of security breach include:
      Damage to public image
      Financial and data loss
      Reduction in productivity
      Downtime
      Legal action