Table of Contents
- 1 What are common indicators of compromise?
- 2 What is a compromised computer?
- 3 Which of the following is a potential indicator of a compromised system?
- 4 Which of the following is indicative of information leakage vulnerability?
- 5 Which characteristic might indicate that your email account has been compromised?
- 6 How do you educate employees about the identified privacy and security risks?
What are common indicators of compromise?
Here are some more common indicators of compromise for you to remember:
- Unusual outbound network traffic.
- Activity from strange geographic areas.
- Unexplained activity by Privileged User Accounts.
- Substantial rise in database read volume.
- High authentication failures.
- Lots of requests on important files.
What is a compromised computer?
A Compromised Computer is defined as any computing resource whose confidentiality, integrity or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.
What are the manifestations that your sense of security is compromised?
Unnecessary or out-of-use accounts. Insecure inbox configurations. Risky data access rules in apps. Password redundancies in different accounts.
What is a compromised network?
A network is compromised if there has been a breach in the confidentiality, integrity or availability of its infrastructure or components in any form.
Which of the following is a potential indicator of a compromised system?
Irregular activities such as traffic in countries an organization doesn’t do business with. Dubious log-ins, access, and other network activities that indicate probing or brute force attacks. Anomalous spikes of requests and read volume in company files. Network traffic that traverses in unusually used ports.
Which of the following is indicative of information leakage vulnerability?
In its most common form, information leakage is the result of one or more of the following conditions: a failure to scrub out HTML/script comments containing sensitive information; improper application or server configurations, or differences in page responses for valid vs. invalid data.
What does being compromised mean?
Definition of compromised 1 : made vulnerable (as to attack or misuse) by unauthorized access, revelation, or exposure compromised data/passwords/accounts a compromised computer. 2 : impaired or diminished in function : weakened, damaged, or flawed a compromised immune system …
Which are large networks of compromised computers?
(roBOT NETwork) Also called a “zombie army,” a botnet is a large number of compromised computers that are used to generate spam, relay viruses or flood a network or Web server with excessive requests to cause it to fail (see denial-of-service attack).
Which characteristic might indicate that your email account has been compromised?
One of the most obvious signs of your email being hacked is the fact that you can’t sign into it. If your email password is rejected as incorrect and you didn’t change it, it’s a strong indication that someone else has altered it.
How do you educate employees about the identified privacy and security risks?
Here are 7 ways you can educate your remote workers on best security practices.
- Make Cybersecurity Clear To Your Employees.
- Encourage Taking Great Care Over Your Devices.
- Teach Employees How to Spot Suspicious Activity.
- Reinforce Confidentiality.
- Examine Individual Cases of Cybersecurity Breaches.
What threats there are to computers?
Types of Computer Security Threats and How to Avoid Them
- Computer Viruses. Perhaps the most well-known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user.
- Spyware Threats.
- Hackers and Predators.
- Phishing.
Which do you perform in the post incident phase of incident response?
In the post incident activity phase, often referred to as a postmortem (latin for after death), we attempt to determine specifically what happened, why it happened, and what we can do to keep it from happening again. This is not just a technical review as policies or infrastructure may need to be changed.