Zero-day exploits
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities
Primary motivations of the Hacktivist
Political, social, or moral disagreements
What component is necessary to form a botnet?
Command & Control Server (C&C)
What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
Phishing
What is the goal of the Cyber Terrorist?
Intimidation through disruption and damage
What is the motivation of the bad actor known as the "Explorer"?
Notoriety
What is the motivation of the "Cyber Terrorist"?
Ideology
What is the motive of the "Cyber Criminal"?
Money
What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Ransomware
What is the primary motive of the "Cyber Warrior"?
The political interest of their country's government
How does implementing multiple security point products from multiple vendors affect managing an environment?
More complicated and more expensive
Internally to the CIO's company, what is the overall impact when a cyber attack causes extended downtime, and employees' time is diverted to post-attack activities?
Productivity is reduced
On average, how can a CIO's tenure be characterized?
CIOs have the shortest tenures among C-level executives.
Regulatory fines related to serious breaches can be characterized in which way?
They can be enormous and seriously impact the bottom line.
What is becoming a regular topic between CIOs, the other C-level executives, and the board or directors?
Implementing cyber security
What is the primary responsibility of a CIO
Controlling the Information Technology (IT) resources of a company
What will a CIO do once they understand the company's business goals and priorities?
Analyze and design the IT infrastructure so that it aligns with those business goals
When investments are made in IT infrastructure, what should a CIO do next?
Show how these investments deliver measurable results
When the general public learns of a serious breach, what is their likely reaction?
An erosion of trust leading to a decline in business with the breached company
Why must a CIO work closely with the other C-level executives?
To understand the company's business goals and priorities.
A CFO's responsibility is to manage financial risk, and that covers which other element?
All the information and data in the company.
Being trustworthy with customer data is now a part of which outcome?
Building brand loyalty.
How does a CFO treat intangible assets such as intellectual property, trade secrets, manufacturing methods, and the information about customers?
Just as responsible for the financial risks to those information assets as any others.
Looking into the past, a CFO will create which kind of reports?
Reporting on the prior financial performance of the company.
Since it uses information from every corner of the business, what does a company's Enterprise Resource Planning (ERP) system require to help the CFO understand what's happening now, and plan for the future?
Accurate and trustworthy information.
What are the consequences if a CFO's reports are not accurate?
From having to re-state the data, to being found in violation of financial regulations.
What does a CFO rely on to create forecasts of what will happen to the company in the future?
Access to good information.
What is the primary responsibility of a CFO?
To manage the finances and the financial risks of the company.
What poses one of the greatest risks to the financial value of a company's information assets?
Cyber threats
What role does a CFO play in new business initiatives, product launches and/or new service offerings?
Analyzes the financial impact.
0 Comments