

Chapter 4
Flashcard
•
Business
•
University
•
Hard
Anthony Nguyen
FREE Resource
Student preview

23 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Unintentional Threats
Back
Security risks that occur without malicious intent, usually caused by mistakes, lack of awareness, or poor procedures. These are among the most common causes of security breaches.
2.
FLASHCARD QUESTION
Front
Human errors
Back
Happens when users accidentally compromise security, such as clicking unsafe links, misconfiguring systems, or mishandling sensitive data.
3.
FLASHCARD QUESTION
Front
Example of Human Errors
Back
Sending confidential data to the wrong email address
Using weak or reused passwords
Falling for phishing emails
Accidentally deleting important files
4.
FLASHCARD QUESTION
Front
Social Engineering
Back
A technique where attackers manipulate people psychologically into revealing confidential information or performing actions that compromise security.
Instead of hacking systems, attackers “hack people.”
5.
FLASHCARD QUESTION
Front
Example of Social Engineering
Back
Kevin Mitnick, one of the most famous hackers discussed in IS courses, used social engineering rather than technical attacks. He tricked employees into giving him passwords by pretending to be IT staff or trusted insiders.
Example:
An attacker calls an employee pretending to be IT support and asks for login credentials to “fix a system issue.”
6.
FLASHCARD QUESTION
Front
Deliberate Threats (Software Attacks)
Back
Are intentional attacks designed to damage systems, steal data, or disrupt operations.
7.
FLASHCARD QUESTION
Front
A Denial of Service (DoS) attack
Back
Flood a system with traffic or requests, overwhelming it so that legitimate users cannot access services.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?