chapter 4 Flashcards
def. information security
Protecting an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
def. threat
Any danger to which an information resource may be exposed
def. vulnerability
The possibility that an information resource will be harmed by a threat
What are the five key factors contributing to the increasing vulnerability of organizational information sources?
- Today’s interconnected, interdependent, wirelessly networked business environment.
- Smaller, faster, cheaper computers and storage devices.
- Decreasing skills necessary to be a computer hacker.
- International organized crime taking over cybercrime.
- Lack of management support.
def. trusted network
any network within your organization
def. untrusted network
any network external to your organization
wireless is an inherently ____________ broadcast communications medium
nonsecure
def. cybercrime
Illegal activities executed on the Internet
what are the to major categories of threats?
unintentional threats
deliberate threats
what is a major category of unintentional threats?
human error
What are two important points about employees regarding threats?
- the higher the level of employee, the greater the threat he or she poses to information security
- - higher level employees typically have greater access to corporate data, and they enjoy greater privileges on organizational information systems - employees in two areas of the organization pose especially significant threats to information security: human resources and information systems (IS)
- -HR employees have access to sensitive personal information, IS employees not only have access to sensitive organizational data but also often control the means to create, store, transmit, and modify those data
who tends to be overlooked when considering threats
janitors and guards
as well as contract labour and consultants
what are human errors they result of?
typically the result of laziness, carelessness, or a lack of awareness concerning information security. This lack of awareness arises from poor education and training efforts by the organization.
def. social engineering
Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges
-most common example is attacker impersonating someone else on the telephone, or impersonating other individuals
two other social engineering techniques
Tailgating: a technique designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry. The perpetrator follows closely behind a legitimate employee and, when the employee gains entry, the attacker asks him or her to “hold the door.”
Shoulder surfing: occurs when a perpetrator watches an employee’s computer screen over the employee’s shoulder. This technique is particularly successful in public areas such as in airports and on commuter trains and airplanes
def. espionage or trespass
occurs when an unauthorized individual attempts to gain illegal access to organizational information
-industrial espionage crosses the legal boundary such as theft of confidential data
def. information extortion
occurs when an attacker either threatens to steal or actually steals information from a company. The perpetrator demands payment for not stealing the information, for returning stolen information, or for agreeing not to disclose the information.
def. sabotage or vandalism
deliberate acts that involve defacing an organization’s website, potentially damaging the organization’s image and causing its customers to lose faith in the organization
-ex. hacktivist or cyberactivist operation
describe dumpster diving
involves rummaging through commercial or residential garbage to find discarded information. Paper files, letters, memos, photographs, IDs, passwords, credit cards, and other forms of information can be found in dumpsters
-this info can be used for fraudulent purposes
def. identity theft
Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud
techniques for illegally obtaining personal info
- Stealing mail or dumpster diving.
- Stealing personal information in computer databases.
- Infiltrating organizations that store large amounts of personal information (e.g., data aggregators such as Acxiom)
- Impersonating a trusted organization in an electronic communication (phishing).
def. intellectual property
The intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws
def. trade secret
Intellectual work, such as a business plan, that is a company secret and is not based on public information
def. patent
A document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years