Chapter 1 Flashcards
(37 cards)
Learning objective
Explain information systems security and its effect on people and businesses.
Key Concepts
- information systems security concepts
- confidentiality, integrity, availability
- 7 domains of an IT infrastructure
- the weakest link in the security of an IT infrastructure
- IT security policy framework and data classification standard
Information Systems Security
- Internet -
- Worldwide network with more than 2 billion users
–> include governments, businesses, and organizations - Links communication networks to 1 another
Information Systems Security
- World Wide Web -
- A system that defines how documents and resources are related across network machines
Data Breaches : Examples
- Adobe Systems Incorporated, 2013 -
–> Hackers published data for 150 million accounts
–> stoles encrypted customer credit card data
–> compromised login credentials - U.S. Office of Personnel Management, 2015 -
–> Data breach impacted 22 million people
–> stole SSNs, names, places of birth, addresses
–> Millions must be monitored for identity theft for years
Internet of Things (IoT)
Connects personal devices, home devices, and vehicles to the Internet
- more data to steal
Cybersecurity
duty of every government that wants to ensure its national security
Data security
the responsibility of every organization that needs to protect its information assets and sensitive data
Risk
likelihood that something bad will happen to an asset
Threat
any action that could damage an asset
Vulnerability
a weakness that allows a threat to be realized or to have an effect on an asset
Information system
hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations
Information system security
the collection of activities that protect the information system and the data stored in it
U.S. Compliance Laws Drive Need for Information Systems Security
CIPA/FERPA, FISMA, SOX, HIPAA, GLBA, PCI DSS (individual privacy data)
Individual Privacy Data must be ______
protected
Security Controls are required to protect ________ ________
Privacy Data
Tenets of Information Systems Security
Confidentiality, integrity, availability
Confidentiality
only authorized users can view information
Integrity
only authorized users can change information
Availability
information is accessible by authorized users whenever they request the information
Examples of Confidentiality
- Privacy data of individuals
- Intellectual property of businesses
- National security for countries + government
Types of Security 4 Confidentiality
- Cryptography
- Encryption
- Ciphertext
Cryptography
practice of hiding data and keeping it away from unauthorized users
Encryption
the process of transforming data from cleartext into ciphertext