Chapter 2 - The Need for Security Flashcards
(47 cards)
What are the 4 learning objectives?
- Discuss the organizational business need for information security
- Explain why a successful information security program is the shared responsibility of an organization’s general management and IT management
- List and describe the threats posed to information security and common attacks associated with those threats
- Describe the relationship between threats and attacks against information within systems
information assets
information and the systems that house them
What are the 4 important functions that IS performs for an organization?
- Protect the org’s ability to function
- Protect the data and info the organization collects and uses
- Enabling the safe operation of applications running on the organizations’ IT systems
- Safeguarding the organization’s tech assets
What is the role of mgmt (general and IT) with respect to IS?
They are responsible for implementing and facilitating a security program
How should information security be addressed?
In terms of business impact (outages, loss of client trust, etc.) and cost of business interruption
What are the three stages through which data must be protected?
data in transmission (input), in processing (transfer), and at rest (storage)
threats
a potential risk to an asset’s loss of value
What are the most common types of attack/misuse as of CSI’s 2011 Survey?
- Malware infection
- Being fraudulently represented as the sender of a phishing message
- Laptop/mobile theft or loss
- Bot/Zombies in the organization
- Insider abuse of internet or email
12 categories of threat
- Compromises to IP
- Deviation in quality of service
- Espionage/trespass
- Forces of nature
- Human error or failure
- Information extortion
- Sabotage or Vandalism
- Software attacks
- Hardware failures/errors
- Software failures/errors
- Technological obsolescence
- Theft
Intellectual Property (IP) & most common type of breach?
creation, ownership and control of original ideas as well as the representation of those ideas
software piracy
What factors can affect quality of service if compromised?
Information systems depend on the operation of many interdependent systems: internet service, communications, suppliers, vendors, janitorial staff, garbage haulers, power irregularities
Forms of espionage/trespass
- industrial espionage
- shoulder surfing
Expert vs. unskilled hacker
Expert hackers: develop software scripts and program exploits, usually a master of many skills, often creates an attack software and shares it with others.
Unskilled hackers - use the expertly written software to exploit a system, do not usually fully understand the systems they hack
Hacker - Cracker
“cracks” or removes the software protection that’s there to prevent unauthorized duplication
Phreaker
hacks the public telephone system to make free calls or disrupt services
Social engineering
using social skills to convince people to reveal access credentials or other valuable information to an attacker
Advance-fee fraud
indicates the recipient is due money and small advance fee/personal banking information is required to facilitate the transfer.
Phishing
attempting to gain personal/confidential info, apparent legitimate communication hides an embedded code that redirects the target to a third party site
Timing attack
Timing Attack - Relatively new, works by exploring the contents of a Web browser’s cache. This could allow the designer to collect information to access to password-protected sites. Another attack by the same name involves attempting to intercept cryptographic elements to determine keys and encryption algorithms.
Malware
Malware - malicious software used to overwhelm the processing capabilities of online systems or to gain access to protected systems via hidden means
Types of Software attacks
–Viruses
–Worms
–Trojan horses
–Polymorphic threats
–Virus and worm hoaxes
–Back door or trap door
–Denial-of-service and distributed denial-of-service
–Mail bomb
Virus
code segments that attach to an existing program and take control of the targeted computer
Worms
replicate themselves until they completely fill available resources such as memory and hard-drive space
Trojan horses
malware disguised as helpful, interesting, or necessary pieces of software