Chapters 1-3 Flashcards
(73 cards)
Define CIA
Confidentiality - information cannot be read
Integrity - attackers cannot change or destroy info
Availability - info is always available for authorized people
What is a Compromise?
- Successful Attacks, breaches or incidents
What are Countermeasures?
- Used to Thwart attacks
What are the Types of Countermeasures?
- Preventative: cost-effective, prevents attacks
- Detective: keeps attacks from succeeding
- Corrective: minimize and restore systems after an attack
What are the Payment Card Industry-Data Security Standards?
- Build and Maintain a Secure Network
- Protect Cardholder Data
- Maintain a Vulnerability Management Program
- Implement Strong Access Control Measures
- Regularly Monitor and Test Networks
- Maintain an Information Security Policy
How are Employees and Ex-employees Dangerous?
- They have knowledge of internal systems
- Often have permission to access systems
- Know how to avoid detection
- Generally trusted
Define Employee Vulnerabilities
- Sabotage
- Hacking
- Financial Theft
- Intellectual Property Theft
- Extortion (employee is victim)
- Sexual or Racial Harassment of Other Employees
- Internet Abuse
- Carelessness
Define Potential Attackers Aside from Employees
- Contract Workers
What is a Virus
Malware that attaches itself to legitimate programs
What is a Direct-Propagation Worm?
Malware that doesn’t need humans to jump between computers
What is a nonmobile Malware?
Malware that needs humans to propagate
What is a RAT
Remote Access Trojan - allows a machine to be remotely controlled
What is a Downloader
A smaller trojan that downloads larger trojans
What is a Reconnaissance Probe?
scans to identify network vulnerabilities
What is an Exploit?
attacker breaks into a computer
What is a Chain of Attack?
An attacker attacks through a chain of victim computers to remain untraceable
Differentiate Expert Attackers and Script Kiddies
Expert hackers are technically skilled and persistent while script kiddies have low skill but are more numerous
What is Cyberwar
Attacks conducted by governments against financial and communication infrastructure
What is Cyberterror
Attacks conducted by terrorists against IT resources
What is Comprehensive Security
A state in which defenders have closed off all possible venues of attack
What makes Security Management a Disciplined Process?
- Complex
- Need Formal Processes
- Continuous Process
- Compliance Regulation
What is the Cycle for Security Management
Plan-protect-Respond
What is Vision
Understanding your role concerning the company
Strategies for IT Security planning
- Identify Current IT Security Gaps
- Identify Driving Forces
- Identify Corporate Resources Needing Protection