____________ is a type of spear-phishing that targets executives and high-profile targets.
Confidentiality means that attackers cannot change or destro…
Confidentiality means that attackers cannot change or destroy information.
A ________ attack is when a victim is flooded with SYN packe…
A ________ attack is when a victim is flooded with SYN packets in an attempt to make many half-open TCP connections.
Employees pose an decreased risk to organizations as they of…
Employees pose an decreased risk to organizations as they often have access to sensitive parts of systems.
If an attacker takes over a firewall, he or she will be able…
If an attacker takes over a firewall, he or she will be able to ________.
________ is the process of assessing the identity of each in…
________ is the process of assessing the identity of each individual claiming to have permission to use a resource.
Consider the scenario where a user enters a search term, and…
Consider the scenario where a user enters a search term, and the attacker tricks the valid website into feeding a malicious script to another browser to execute. Example: Pop-up window, “Thank you, Abby, for your submission!” This describes _____________________.
Open networks can be legally accessed by anyone and are freq…
Open networks can be legally accessed by anyone and are frequently posted as such.
_____________ fraud attempt that targets a specific organiz…
_____________ fraud attempt that targets a specific organization in order to seek unauthorized access to confidential data.
The NIST Cyber Security Framework is voluntary guidance, bas…
The NIST Cyber Security Framework is voluntary guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders.