Define Information security
Information security: refers to all of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction
What’s the difference between a threat, an exposure, vulnerability
Threat: to an information resource is any danger to which a system may be exposed.
Vulnerability: is the possibility that a threat will harm that information resource.
Exposure: is the harm, loss, or damage that can result if a threat compromises an information resource
What are the five key factors contributing to the increasing vulnerability of organizational information resources?
What are the two major categories of threats?
unintentional threats and deliberate threats
Define Unintentional threats and what are the two categories of it?
Unintentional threats: are acts performed without malicious intent that nevertheless represent a serious threat to information security.
Catergories: Human Error and Social Engineering
Unintentional threats: Explain two points to be made about employees? What about contract labour, consultants, and janitors and guards?
1.The higher the level of employee, the greater the threat they pose to information security
2.Employees in human resources and information system pose especially significant threats to information security:
Other relevant but overlooked employees include contract labour, consultants, and janitors and guards (have access to the sensitive places in office)
Unintentional Threats: Social Engineering as well as tailgating and shoulder surfing
Social engineering: is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords
Tailgating: is a technique designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry
Shoulder surfing: occurs when a perpetrator watches an employee’s computer screen over the employee’s shoulder
Deliberate Threats: define Identity Theft and how could a criminal do it?
Identity theft: is the deliberate assumption of another person’s identity, usually to gain access to their financial information or to frame them for a crime.
Techniques for illegally obtaining personal information include the following:
* Stealing mail or dumpster diving
* Stealing personal information in computer database
* Impersonating a trusted organization in an electronic communication (phishing)
Deliberate Threats, Software Attacks: define Malware and Ransomware
Malware: malicious software
Ransomware: or digital extortion, blocks access to a computer system or encrypts an organization’s data until the organization pays a sum of money
Explain the common method for ransomware attacks
Starts with S and another one is D
Employees receive hundreds of emails every day, and many of their roles require them to download and open attachments
Cybercriminals are beginning to threaten to release data to the public, a strategy known as doxing
What is Alien Software?
Alien software: or pestware, is software that is installed secretly onto your computer through duplicitous methods. Can also enable other parties to track your Web surfing habits and other personal behaviours
Alien Software: define Adware, Spyware (Keystroke loggers, Screen scrapers) Tracking Cookies
Adware: software that causes pop-up advertisements to appear on your screen.
Spyware: is software that collects personal information about users without their consent.
Types are keystroke loggers and screen scrapers:
Cookies: are small amounts of information that websites store on your computer, temporarily or more or less permanently
Tracking cookies— an be used to track your path through a website, the time you spend there, what links you click on, and other details that the company wants to record, usually for marketing purposes.
What is Supervisory Control and Data Acquisition (SCADA)?
SCADA refers to a large-scale distributed measurement and control system.
Define Cyberterrorism/cyberwarfare
Cyberterrorism and cyberwarfare: refer to malicious acts in which attackers use a target’s computer systems, particularly through the Internet, to cause physical, real-world harm or severe disruption, often to carry out a political agenda
What are some reasons why is it difficult to protect information reasources?
Compare Risk management and Risk analyses
and explain each one
Risk management: is to identify, control, and minimize the impact of threats.
* Risk management consists of three processes: risk analysis, risk mitigation, and controls evaluation.
Risk analysis: ensure that their IS security programs are cost effective
* Involves three steps:
1. Assessing the value of each asset being protected,
2. Estimating the probability that each asset will be compromised,
3. Comparing the probable costs of the asset’s being compromised with the costs of protecting that asset.
What is the purpose of control?
The purpose of controls is to safeguard assets, optimize the use of the organization’s resources, and prevent or detect errors or fraud
The single most valuable control is —– and —-
The single most valuable control is user education and training - makes every member of the organization aware of the vital importance of information security.
Define Access controls and its two major functions: authentication and authorization
Access controls: restrict unauthorized individuals from using information resources
* Access controls can be physical controls or logical controls
Authentication: confirms the identity of the person requiring access
Authorization: determines which actions, rights, or privileges the person has, based on their verified identity
Define Communications Controls
Communications controls: secure the movement of data across networks.
* consist of firewalls, anti-malware systems, whitelisting and blacklisting, encryption, virtual private networks (VPNs), transport layer security (TLS), and employee monitoring systems.
Communications Controls: Define Firewalls, Anti-malware Systems, Whitelisting and Blacklisting, Encryption, Virtual Private Networking, Transport Layer Security, Employee Monitoring Systems, Application Controls
Firewall: is a system that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company’s network.
Anti-malware systems: also called antivirus or AV, software, are software packages that attempt to identify and eliminate viruses and worms, and other malicious software
Whitelisting: is a process in which a company identifies the software that it will allow to run on its computers (only certain/select software is allowed to run on computer)
Blacklisting: allows everything to run unless it is on the blacklist
Encryption: is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
* All encryption systems use a key, which is the code that scrambles and then decodes the messages
* uses two different keys: a public key and a private key; The public key (locking key) and the private key (the unlocking key)
Virtual private network (VPN): is a private network that uses a public network (usually the Internet) to connect users
Transport layer security (TLS): is an encryption standard used for secure transactions such as credit card purchases and online banking
Employee monitoring systems: scrutinize their employees’ computers, email activities, and Internet surfing activities.
Application controls: are security countermeasures that protect specific applications in functional areas
People who are responsible for security need to answer questions such as: Are all controls installed as intended? Are they effective? Has any breach of security occurred?
What is IS audit?
Information systems audit: is an examination of information systems, their inputs, outputs, and processing. It can also include an assessment of the efficiency and effectiveness of the system.
What is the purpose of a diaster recovery plan?
define Business continuity planning
Business continuity planning: is the chain of events linking planning to protection and to recovery.
* The purpose of the business continuity plan is to provide guidance to people who keep the business operating after a disaster occurs.
These strategies include hot sites, warm sites, cold sites, and off-site data and program storage.