Chapter 12: Managing Information Security and Privacy Flashcards

(76 cards)

1
Q

Identity Theft

A

Stealing, misrepresenting, or hijacking the identity of another person or business

vital information, such as a person’s name, address, date of birth, social insurance number, and mother’s maiden name, are often all that is needed to facilitate impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Personal Information Protection and Electronic Documents Act (PIPEDA)

A

In Canada, PIPEDA gives individuals the right to know why an organization collects, uses, or discloses their personal information

PIPEDA does not, however, facilitate individuals suing organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secruity threats

A

A problem with the security of information or the data therein, caused by human error, malicious activity or natural disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three sources of security threats

A

(1) human error and mistakes,
(2) malicious human activity,
(3) natural events and disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Human errors and mistakes

A

Include accidental problems caused by both employees and others outside the organization.

An example is an employee who misunderstands operating procedures and accidentally deletes customer records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malicious human activity

A

This category includes employees and others who intentionally destroy data or other system components. It also includes hackers who break into a system, virus and worm writers who infect computer systems, and people who send millions of unwanted emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spam

A

Unwanted email messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Natural events and disasters

A

Category includes fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature or accidents.

Problems in this category include not only the initial loss of capability and service but also losses stemming from actions to recover from the initial problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Five types of security problems

A

(1) unauthorized data disclosure,
(2) incorrect data modification,
(3) faulty service,
(4) denial of service,
(5) loss of infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unauthorized data disclosure

A

Can occur by human error when someone inadvertently releases data in violation of policy.

An example at a college or university would be a new department administrator who posts student names, numbers, and grades in a public place

In Canada, this type of disclosure is covered by PIPEDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pretexting

A

Occurs when someone deceives by pretending to be someone else.

A common scam involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

technique for obtaining unauthorized data, and it uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, social insurance numbers, account passwords, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spoofing

A

term for someone pretending to be someone or somewhere else. If you pretend to be your professor, you are spoofing your professor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP spoofing

A

occurs when an intruder uses another site’s IP (Internet Protocol) address as if it were that other site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sniffing

A

technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

drive-by sniffers

A

simply access computers with wireless connections through an area and search for unprotected wireless networks. They can monitor and intercept wireless traffic at will.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Incorrect Data Modification

A

Incorrectly increasing a customer’s discount or incorrectly modifying an employee’s salary, earned days of vacation, or annual bonus are actions that might fall under this category

can occur through human error when employees follow procedures incorrectly or when procedures have been incorrectly designed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hacking

A

when a person gains unauthorized access to a computer system. Although some people hack for the sheer joy of doing it, other hackers invade systems for the malicious purpose of stealing or modifying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Faulty Service

A

Includes problems due to incorrect system operations. Faulty service encompasses incorrect data modification, as well as systems that incorrectly send the wrong order to customers, programs that incorrectly bill customers, and software that sends erroneous information to employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

denial of service (DOS)

A

Security problems in which users are not able to access an information system; can be caused by human errors, natural disaster, or malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Loss of Infrastructure

A

Examples are a bulldozer cutting fibre-optic cables, or the maintenance staff unplugging an important device in order to plug in a vacuum cleaner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A security program has three components:

A

(1) senior management involvement,
(2) safeguards of various kinds,
(3) incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

(1) senior management involvement,

A

First, senior management must establish the security policy. This policy sets the stage for the organization’s response to security threats.

Senior management’s second function, therefore, is to manage risk by balancing the costs and benefits of the security program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Technical safeguards

A

involve the hardware and software components of an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
primary technical safeguards
1) identification and authentication 2) Encryption 3) Firewalls 4) Malicious protection 5) Design for secure applications
26
1) identification and authentication
Every non-trivial information system should require some form of authentication.
27
identification
The process whereby an informing system identifies a user by requiring the user to sign on with a user name and password
28
authentication
The process whereby an information system approves (authenticates) a user by checking the user's password
29
authentication methods fall into three categories:
(1) what you know (password or PIN), (2) what you have (smart card), (3) what you are (biometric).
30
Passwords
- users tend to be careless in their use - users tend to be free in sharing their passwords with others - many users choose ineffective, simple passwords or use the same password for many systems
31
Smart card
Plastic card that is similar to a credit card. Unlike credit, debit, and ATM (automatic teller machine) cards, which have a magnetic strip, smart cards have a microchip. The microchip holds far more data than a magnetic strip and has identifying data or algorithms.
32
personal identification number (PIN)
Form of authentication whereby the user supplies a number that only they know
33
challenge-response authentication
Form of authentication that uses a varying form of numeric question and algorithmic response (usually involving sophisticated computerized tokens) to validate users
34
Biometric authentication
uses personal physical characteristics, such as fingerprints, facial features, and retinal scans, to authenticate users.
35
malware
malware includes viruses, worms, Trojan horses, spyware, and adware Broad definition, has many def's
36
Spyware
Programs are installed on the user’s computer without the user’s knowledge or permission. Spyware resides in the background and, without the user’s knowledge, observes the user’s actions and keystrokes, monitors computer activity, and reports that activity to sponsoring organizations
37
Adware
Similar to spyware in that it is installed without the user’s permission and resides in the background to observe user behaviour. Most adware is benign in that it does not perform malicious acts or steal data. It does, however, watch user activity and produce pop-up ads
38
Malware Safeguards
1) Install antivirus and anti-spyware programs 2) Set up your anti-malware programs to scan your computer frequently. 3) Update malware definitions 4) Open email attachments only from known sources 5) Promptly install software updates from legitimate sources. 6) Browse only in reputable Internet neighbourhoods
39
Malware definitions
patterns that exist in malware code—should be downloaded frequently. Anti-malware vendors update these definitions continually, and you should install these updates as they become available.
40
Data safeguards
Steps taken to protect databases and other organizational data by means of data administration and database administration
41
Two organizational units are responsible for data safeguards
1) data administration | 2) database administration
42
Data administration
refers to an organization-wide function that is in charge of developing data policies and enforcing data standards typically a staff function reporting to the chief information officer (CIO).
43
Database administration
refers to a function that pertains to a particular database. The enterprise resource planning (ERP), customer relationship management (CRM), and supply chain management (SCM) databases each have a database administration function
44
key escrow
Control procedure whereby a trusted party is given a copy of a key used to encrypt database data
45
Human safeguards
involve the people and procedures components of information systems. In general, human safeguards result when authorized users follow appropriate procedures for system use and recovery.
46
Position Definitions
Effective human safeguards begin with creating definitions of job tasks and responsibilities. In general, job descriptions should provide a separation of duties and authorities.
47
Hiring and Screening
Security considerations should be part of the hiring process. Of course, if a position involves no sensitive data and no access to information systems, then screening for information systems security purposes will be minimal.
48
Dissemination and Enforcement
Employees cannot be expected to follow security policies and procedures that they are not aware of. Therefore, employees need to be made aware of the security policies and procedures and of their responsibilities.
49
Enforcement consists of three interdependent factors:
(1) responsibility, (2) accountability, (3) compliance
50
Termination
Standard human resources policies should ensure that system administrators receive notification in advance of the employee’s last day so that they can remove accounts and passwords
51
Human Safeguards for Non-employees
Business requirements may necessitate opening information systems to non-employees—temporary personnel, vendors, partner personnel (employees of business partners), volunteers, and the public.
52
Hardening a site
means to take extraordinary measures to reduce a system’s vulnerability. Hardened sites use special versions of the operating system and lock down or eliminate operating system features and functions that are not required by the application
53
Account Administration
The administration of user accounts, passwords, and help-desk policies and procedures is an important component of the security system.
54
Account Management
Account management concerns the creation of new user accounts, the modification of existing account permissions, and the removal of unneeded accounts.
55
System Procedures
normal operation, backup, and recovery
56
Security Monitoring
Important monitoring functions are analysis of activity logs, security testing, and investigating and learning from security incidents.
57
What Is Disaster Preparedness?
The best safeguard against a disaster is appropriate location place computing centres, Web farms, and other computer facilities in locations not prone to floods, earthquakes, hurricanes, tornados, or avalanches
58
Disaster Preparedness Guidelines
1) locate infrastructure in safe location 2) Identify mission-critical systems 3) Identify resources needed to run those systems 4) Prepare remote backup facilities 5) Train and rehearse
59
hot sites
remote processing centres and may be run by commercial disaster-recovery services. For a monthly fee, they provide all the equipment needed to continue operations following a disaster and there may be minimal downtime or unavailability following a disaster
60
Cold sites
provide space and limited technology and customers provide and install the equipment needed to continue operations following a disaster. Recovery time is considerably longer
61
Warm sites
somewhere in the middle of the two extremes.
62
Factors in Incident Response
1) Have plan in place 2) Centralized reporting 3) Specific responses (speed, preparation pays, dont make problems worse) 4) Practice
63
____________________ provides useful information about what identity theft is and who to contact if it happens to you.
The Public Safety Canada website
64
​Equifax, a global technology company specializing in proving credit scores and personal privacy​ protection, had a cybersecurity incident and​ 1,000,000 Canadian customers were impacted. Compromised personal information included all the​ following, except:
email addresses.
65
An easy way to remember information systems safeguards is to arrange them according to the​ ______ components of an information system.
5
66
What two critical factors do organizations need to address when responding to security​ threats?
security policy and risk management
67
What should data administration define​ initially?
Data policies
68
Which of the following is not an example of a data​ safeguard?
Virus protection
69
The organizational function that pertains to developing and enforcing data policies and standards is called​ ________.
Data administration
70
Which is the single most important safeguard that an individual computer user can​ implement?
Using strong passwords
71
Human safeguards involve the​ ___________ and​ ___________ components of information systems.
people, procedure
72
All the following are major disaster preparedness​ tasks, except:
Monitor security
73
Preparing a​ ________________ facility is very​ expensive; however, the costs of establishing and maintaining that facility are a form of insurance.
backup
74
​__________________ allows the organization to learn about security​ threats, take consistent actions in​ response, and apply specialized expertise to all security problems.
Centralized reporting
75
​________ will enable an organization to determine whether it is under systemic attack or whether an incident is isolated.
Centralized reporting
76
When an incident does​ occur, ____________ is of the essence.
speed