Solution
Responsible for attacks in retail point of sale systems - B. Memory scrapers
Hacker controlling multiple computers to aid in their efforts - D. Distributed attacks, as here the hackers control or infect multiple computer to aid in greater objective.
Viewed both as a goal and a process - G. Information security, is viewed both as a goal and a process
Three facets that make up the focus on information protection - CIA, Confidentiality, integrity and availability.
Validates an end user's identity - C. Authentication, is the process which validates an end user's identity.
An action with the potential to cause harm - I. Security threat, are the actions which can cause harm.
Standards designed to protect credit card transactions - H. PIC DSS. Ideally it should be Payment Card Industry Data Security Standard (PCI DSS).
Download programs which do the attacking - J. Script kiddies, these persons donwload attack scripts and they are not able to write scrip[ts on their own
Have provided an alternate pathway to waging war on other countries - F. State sponsored attacks
A modern day moat and draw bridge for information protection - A. Security perimeter, for protection of the security
Hope this will help
Please rate
Module 5 Matching 4 responsible for attacks on retail point of sale systems information security hackers...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...