according to the US bureau of labor statistics, what percentage of growth is the available job
outlook supposed to reach by the end of the decade - 18
what information security position reports to the ciso and supervises technicians, administrators, and security staff? - manager
Which position b...
according to the US bureau of labor statistics, what percentage of growth is the available job
outlook supposed to reach by the end of the decade - 18
what information security position reports to the ciso and supervises technicians, administrators,
and security staff? - manager
Which position below is considered an entry-level position for a person who has the necessary
technical skills? - security technician
what country is now the number one source of attack traffic? - Indonesia
What kind of server connects a remote system through the Internet to local serial ports using
TCP/IP? - serial server
in what kind of attack can attackers make use of hundreds of thousands of computers under
their control in an attack against a single server or Network - distributed
Which term below is frequently used to describe the tasks of securing information that is in a
digital format? - information security
the security protection item that ensures that the individual is who they claim to be the
authentic or genuine person and not and an imposter is known as -
authentication
which of the three protections ensures that only authorized parties can view information
- confidentiality
, select below the information protection item that ensures that information is correct and that
no unauthorized person or malicious software has altered that data - integrity
what type of theft involves stealing another person's personal information, such as a social
security number, and then using the information to impersonate the victim, generally for
financial gain? - identity theft
in information security, what constitutes a loss? - all all of the above
to date, the single most expensive malicious attack occurred in 2000, which cost an estimated
8.7 billion dollars. what was the name of the attack? - love bug
What term is used to describe a loose network of attackers, identity thieves, and financial
fraudsters? - Cybercriminals
Select below the term that is used to describe individuals who want to attack computers yet lack
the knowledge of computers and networks needed to do so - script kiddies
healthcare enterprises are required to guard protected health information and implement
policies and procedures whether it be in paper or electronic format - HIPAA
purpose is to strengthen domestic security and broaden the powers of law enforcement
agencies with regards to identifying and stopping terrorists - us Patriot act
standards created to require accessibility of electronic media websites software applications,
operating systems, video, etc. - Americans with disabilities
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller HARVARDGURU. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £11.49. You're not tied to anything after your purchase.