Chapter 5: Information Security: Protecting Information and Resources Flashcards

1
Q

Information Security

A

protect organization data and IS from unauthorized access and use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Costs of Information Security Breaches

A

stolen work, blackmail, money, damage to company property, clients and reputation, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triangle

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

prevent disclosing information to anyone who is not authorized to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

accuracy and reliability of information resources within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability (3)

A

-computers and networks are operational
- users can obtain information required
- quick recovery in event of failure or disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

McCumber Cube and sides

A

3 dimensional cube to bring goals together
Side 1: Transmission, Storage, Processing
Side 2: Confidentially, Integrity, Availability
Slide 3. Human Factors, Privacy and Practice, Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threats: Spyware

A

software secretly gathers info about users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threats: Adware

A

Form of spyware, collects info about user to displays ads in web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threats: Phishing

A

Sending fraudulent emails appearing from legitimate sources. Not directed like spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threats: Pharming

A

hijack IP address of a website etc users who enter website are directed to fraudulent website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threats: Spear Phishing

A

target email scan with sole purpose of obtaining sensitive data from company, person or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threats: Baiting & Quid Pro Quo

A

get someone to fall for something out of their own curiosity or fear, cyber actors offer them something in return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keystroke Loggers
what are they
what can they be used for (3)

A

monitor and record keystrokes
1. track employees computer use
2. Malicious purposes
3. prevent antivirus and anti-spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threats: Sniffing

A

hackers capture and record network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threats: Spoofing

A

gain access to network by posing as an authorized user, disguise their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threats: Virus

A

self-propagating program code and attaches itself to many files and will cycle when program is used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threats: Worm

A

virus or program that can independently spread without being attached to host program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Threats: Trojan Programming

A

A code that is intended to disrupt a computer, network or website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Threats: Logic Bomb

A

Type of trojan program, release destructive worm or code

21
Q

Threats: Backdoor

A

designer can bypass security and sneak back into system to access program or files

22
Q

Threats: Blended Threat

A

Public and private networks, combine threats, virus, worms and codes to evade

23
Q

RAM Scraping

A

Scans RAM (memory) to find sensitive saved data

24
Q

Credentialing

A

stealing passwords, logins

25
USB Worms
Viruses stored on USB device
26
Cryptojacking
Harnessing loose computing program to mine cryptocurrency
27
Social Engineering
use peoples skills to trick others into revealing private information to break into networks and servers
28
Denial of Service Attack (DoS)
Floods a network with service requests to prevent legitimate user's access to the system
29
Distributed Denial of Service Attack (DDoS)
thousands of computer work together to bombard a website with thousands of requests causing it to halt
30
Telephony Denial of Service (TDoS)
high volumes of automated calls to tie up a target phone system, company comes to a halt
31
Types of Hackers and description (3)
Script Kiddies: Use for malicious intent but not as skilled Black Hats: Typical Hacker White Hacker: Ethical hacker given permission to determine vulnerability of the software/network
32
Defence: First Step to Comprehensive Security System Fault-Tolerant Systems and examples (3)
Ensure availability in event of a system failure by using hardware and software - Uninterruptible Power Supply (UPS) - Redundant Array of Independent Disks (RAID) - Mirror Disk
33
Defence: Access Controls
Designed to protect system from unauthorized access
34
Biometric Security Measures and examples
Physiological element unique to person which cannot be stolen or copied
35
Non Biometric Measures: Callback Moderns
Log user off and call back at predetermined number (working from home)
36
Non Biometric Measures: Terminal Resource Security
erases the screen and signs user off automatically after a length of inactivity
37
Non Biometric Measures: Intrusion Detect System
protect against internal and external acess
38
Non Biometric Measures: Password
a login credential made up of text, keys, symbols and characters
39
Physical Security measures: (4)
cable shielding electronic tracker steel encasements ID Badges
40
Firewalls and what does it decide?
soft/hardware barrier between private network and external computer or network decides whether to allow transmission of data
41
Firewall Actions (4)
reject, report, reply, accept,
42
Types of Firewall: Packet-filtering firewall
examines every packet passing in/out of network
43
Types of Firewall: Application-filtering firewall
controls use of applications like email
44
Types of Firewall: Proxy Server
intermediary between two systems
45
Virtual Private Network (VPN)
secure tunnel through the internet to transmit messages, information and data etc WawanesaLife VPN
46
Data Encryption
Transform Data (plaintext) to scrambled form (ciphertext)
47
Encryption Protocols (3)
1. Manage encryption and security over internet 2. secure socket layers 3. Transport Layer Security
48
Types of Encryption: 2
Public Key Infrastructure: Asymmetric Equation Secret Key Encryption: Symmetric Equation