Week 11 Flashcards

1
Q

Why do we need security and controls for Information systems?

A

IS share data and provide resources to lots of people including those who shouldn’t have access. Controls upon information systems are based upon two underlying principles:
– The need to ensure accuracy of data
– The need to protect against loss or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are systems vulnerable?

A

Summary : Human error, physical problems, computer crime and invasion of privacy

System complexity –Testing not extensive enough
Unauthorised access is always possible
Human error – People couldn’t be bothered with procedures - a system programmed to do checks will do all the time whereas sometimes people won’t. Don’t use virus checkers, etc., Fail to back up data
Poor audit means that nobody checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What were the results of the cyber security survey 2017

A

48% of business have no cyber security policy in palce and 72% of small business network security is looked after by the owner, office manager or nobody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How might small companies deal with netwokr security management

A

In small companies, network security may not be anyone’s primary responsibility
and there many not be anyone with specialist training in that area.
Therefore, outsourcing or using cloud software may be safer as this is giving responsibility to specialists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats the trend of % of IT spend on security? Why is this trend in place for IT spending?

A

IT spend on security is growing
Recent growth was driven by more extensive use of IT in the pandemic
- Electronic rather than physical interactions with customers
- Remote working by employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give examples/ statistics of cybercrime in Ireland

A

HSE Attack
Garda data says that in 2021 phishing and smishing is up over 1400% since last year- all cybercrime is up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define cyber risk

A

Cyber Risk is the risk of any financial loss, disruption or negative reputational impact because of a failure in IT systems; whether through people, process or technology.
* risks emanating from the use of electronic data and its transmission, including tools such as the Internet
* physical damage caused by cyber-attacks;
* fraud committed by misuse of data;
* liability arising from data use, storage and transfer
* availability, integrity, and confidentiality of electronic information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give examples of specific cyber risks

A
  • Business interruption
  • Contingent business interruption
  • Data and software loss
  • Intellectual property theft
  • Network Security/Security
  • Breach of Privacy Compensation
  • Reputational Damage (excluding legal protection)
  • Compensation for crisis management/remediation actions requiring internal or external experts
  • Cyber ransom and extortion
  • Financial theft and/or fraud
  • Regulatory & Legal Defence costs
  • Incident response costs
  • Fine and Penalties
  • Communication and media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain how to insure against cyber attacks

A

Most cyber-attacks are not covered by standard insurance policies, even though Cybercrime is the fastest growing criminal act in the world. But you can take out cyber insurance. However direct costs can be very considerable even with insurance and reputational damage is substantial. You can be held liable for third party data such a customer data or credit card data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What expenses does cyber insurance cover?

A

– Investigation: to determine what occurred, how to repair damage and how to prevent the same type of breach from occurring again
– Business losses: network downtime, business interruption, data loss recovery, repair/replace damaged equipment etc.
– Privacy and notification: to customers and other affected parties,
– Lawsuits and extortion: includes legal expenses for the release of confidential information, legal settlements and fines
Includes expert help in some cases - legal help consultancy support, liability support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is cyberinsurance not a mature market?

A

People are uncertain what the risks are and how to price the insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some simple measures everyone should do - cyber first aid

A
  • Wi-fi: Change default router password, Don’t use public wifi without vpn
  • Passwords: Secure devices with passwords, pins, biometrics, Use encryption and two factor authentication
  • Back up data: Check the back ups work!
  • Use antivirus software
  • Review app permission
  • Keep personal and work data separate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are security planning principles

A

Risk analysis - balancing threat and protection costs for assets, goal is to reduce risk to an economically rational level.
Comprehensive security - close off all avenues of attack
Defence in depth - attacker should have to break through several lines of defence to succeed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define internal audit

A

Internal Audit
Third force that checks the adequacy of the controls in place. This might include some external assistance from experts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain risk management department

A

Centralised control of the enterprise, including compliance, legal, quality control and financial control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What info must you know to have proper permissions in palce for ninformation systems

A
  • What people do
  • What data they produce
  • What data they use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the key principles of security planning

A

Minimum permissions : access control is limiting who can use resources and limiting their permissions to the minimum required to do their job but also so they cannot do unauthorised things

18
Q

How do you reduce exposure to security threats

A
  • Containment – Controlling access to an information system
  • Deterrence – Threat of punishment to discourage potential
    intruders
  • Obfuscation – Hiding or distributing assets to limit damage
  • Recovery – Ensuring normal operation resumes as quickly as
    possible with as little disruption as possible
19
Q

What are some other control techniques - some of which do not prevent problems but allow you to recover form them.

A
  • User Validation or Access Controls
  • Back-up Procedures
  • Auditing – Regular stock-take of procedures, hardware,
    software and data
20
Q

What are the different categories of controls

A

Physical protection
Software controls
Biometric controls - ex individuals unique characteristics

21
Q

What’s an important control measure when physical parts are disposed of

A

Data is often left on phones/laptops etc when they are disposed of. As a
minimum the data needs to be deleted and overwritten by an erasure program.
Organisations like Camara that recycle computers will wipe data before sending them to those reviving donations

22
Q

Explain access control

A

Controlling access to resources so only the right people get access
Authentication involves supplicant sending credentials to verifier proving its identity from a distance

23
Q

What is password authentication and the benefits

A

Reusable Passwords
– Strings of characters typed to authenticate the use of a username (account) on a computer.
– They are used repeatedly and so are called reusable passwords.
Benefits
– Ease of use for users (familiar)
– Inexpensive because built into operating systems

24
Q

Why are passwords often guessed/ reason for concern? How can protection be enhanced

A

People use weak and easily guessed passwords
Constant password changes enhance protection, but people cannot remember them.
Word and name passwords are never adequately strong.- need to be complex and long which can cause problems as people often tend to write them down.

25
Q

How does the speed of computers influence passwords

A

Faster computers make it easier to break passwords so we need longer more complex passwords than would have sufficed in the past.

26
Q

What is 2 factor authentication

A

Adds another layer other than just the traditional password
Ex: Text your phone when you change PW
Phone app verification

Quite a usual method now but what happens if you lose your phone

27
Q

What are some other forms of authentication other than password

A

Access acrds
Biometrics - uses body measurements
ex: fingerprint scanning, iris scanning, facial scanning

28
Q

Bring your own device - What are the issues with this?

A

Data theft, malware, lost or stolen devices, Improper mobile management, Insufficient employee training, shadow IT

29
Q

Explain the UCD networks and firewalls

A

UCD wireless firewall is quite restrictive, UCD Eduroam wireless has fewer
restrictions and UCD staff wired network less again, because in the latter cases there is a record of who is generating the traffic

30
Q

Explain how does a firewall work

A

A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

31
Q

What is cryptography give an example fo its application IT security

A

The art of writing or solving codes. Ex: Message integrity - can tell if message has been altered on route

32
Q

What are the stages of responding to an attack

A

– Detecting the attack
– Stopping the attack
– Repairing the damage
– Punishing the attacker?

33
Q

What is key to incident response

A

Response should be in line with a plans. You need a plan when you have time to think about it, and then merely modify it when there is an actual attack.

34
Q

What classifies a major incident response

A

Major incidents are incidents the on-duty security staff cannot handle.
Company must convene a computer security incident response team (CSIRT)
A major IT problem is not only a technical issue, it needs a response from the
entire organisation.

35
Q

What does IT disaster recovery usually consist of

A

Dedicated backup sites and transferring personnel
or
Having two sites mutually back up each other

36
Q

What does business continuity recovery involve

A

Business continuity recovery
– Getting the whole firm back into operation
– IT is only one concern

37
Q

Why are rehearsals for incident response necessary

A

Serious incidents are infrequent, fortunately. However, you need to rehearse or simulate the event in advance to make sure that your continuity arrangements work.

38
Q

What are some recent IT threats to be aware of as an individual

A
  • Password-stealing Web sites will increase
  • Hackers will target video files
  • Mobile phone attacks will become more prevalent
  • Identity theft and data loss will continue to be a
    public issue
  • More Adware
  • Ransomware
39
Q

How to manage internet threats

A
  • Use of firewalls
  • Adopt procedures for internet usage
  • Establish a protocol for incoming mail
  • Keep all virus checkers and OS software up to
    date
  • Harden new machines before connecting to
    Internet
40
Q

What problems digital money presents and how to overcome it?

A

Digital information has the following property - easy to duplicate and could copy digital money and double spend it
To a solve double-spending - using a peer to peer network, a public ledger using blockchain data structure will also protect