Chapter 9 Part 1
Chapter 9 Part 1
Protecting information and information systems Annual security survey of U.S. corporations,
from unauthorized access, use, disclosure, government agencies, financial and medical
disruption, modification, perusal, inspection, institutions, and universities conducted by the
recording or destruction Computer Security Institute
business continuity plan A plan that keeps the business running after a disaster occurs; each
function in the business should have a valid recovery capability plan
Exposure The estimated cost, loss, ordamage that can result if a threat exploits a
vulnerability.
)(يعنى لو هاكر دخل ولعب او خرب في السيستم ايه تكلفة الداتا اللي ممكن يبوظها
Fraud Any business activity that uses deceitful practices or devices to deprive
another ofproperty or other rights
social engineering A type of nontechnical attackthat uses some ruse to trick users into
revealing information or performing an action that compromises a
computer or network
Zombies Computers infected with malware that are under the control of a
spammer, hacker,or other criminal
Note:
EC Security Requirements:-
deterring measures Actions that will make criminals abandon their idea
of attacking a specific system(e.g., the possibility of
losing a job for insiders).
prevention measures Ways to help stop unauthorizedusers (also known as
“intruders”) from accessing any part of the EC system
macro virus (macro worm) A macro virus or macro worm isexecuted when
the application object that contains the macrois
opened or a particular procedure is executed
2. What is a worm?
a) A type of virus that requires its host program to be run to activate it
b) A software program that runs independently and consumes the resources of its host in order to maintain
itself
c) A piece of software code that inserts itself into a host, including the operating system,
in order to propagate
d) None of the above
4. What is phishing?
a) Pages created deliberately to trick search engines into offering inappropriate search results
b) Pages that use techniques that deliberately subvert a search engine's algorithms to
artificially inflate their rankings
c) A type of social engineering attack that involves tricking users into divulging
sensitive information by posing as a trustworthy entity
d) None of the above
5. What is encryption?
a) The process by which plaintext is converted into ciphertext to protect data from
unauthorized access
b) The process by which ciphertext is converted back into plaintext for human-readable output
c) The process by which data is compressed to reduce its size for storage or transmission
d) None of the above
Answers:
1- C 2-B 3- A 4- C
5- A 6- C 7- C 8- B
9-B 10-C 11-A 12- A
13-A 14-B 15-B