Exam 1 (Material from Chapters 1 - 4) Flashcards
(149 cards)
Internet vs World Wide Web
The World Wide Web is a specific subset of the Internet.
A _____ is the level of exposure to some event that has an effect on an asset
risk
Definition of a vulnerability
A weakness that allows a threat to be realized or to have an effect on an asset
Definition of a threat
Any action, either natural or human induced, that could damage an asset
_____ are hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations.
Information systems
What is the collection of activities that protect the information system and the data stored in it?
Information systems security
What are some of the things we are securing?
Privacy of individuals
Corporate intellectual property
Online B2C and B2B transactions
Government intellectual property
(More examples on slide 11 from CH01 slides)
What is confidentiality?
Only authorized users can view information
What is integrity?
Only authorized users can change information
What is availability?
Information is accessible by authorized users whenever they request the information
Confidential information includes?
- Private data of individuals
- Intellectual property of businesses
- National security for countries and governments
What is cryptography?
Practice of hiding data and keeping it away from unauthorized users
What is encryption?
The process of transforming data from cleartext into ciphertext
What is ciphertext?
The scrambled data that results from encrypting cleartext
Availability Time Measurements
Uptime
Downtime
Availability [A = (Total Uptime)/(Total Uptime + Total Downtime)]
Mean time to failure (MTTF)
Mean time to repair (MTTR)
Mean time between failures (MTBF)
Recovery point objective (RPO)
Recovery time objective (RTO)
What are the seven domains of a typical IT infrastructure?
- User Domain
- Workstation Domain
- LAN Domain
- LAN-to-WAN Domain
- WAN Domain
- Remote Access Domain
- System/Application Domain
Common Threats in the User Domain
- Unauthorized access
- Lack of user awareness
- User apathy toward policies
- Security policy violations
- User inserting CD/DVD/USB with personal files
- User downloading photos, music, or videos
- User destroying systems, applications, and data
- Disgruntled employee attacking organization or committing sabotage
- Employee romance gone bad
- Employee blackmail or extortion
Common Threats in the Workstation Domain
- Unauthorized workstation access
- Unauthorized access to systems, applications, and data
- Desktop or laptop operating system and software vulnerabilities
- Desktop or laptop application software vulnerabilities and patches
- Viruses, malicious code, and other malware
- User inserting CD/DVD/USB with personal files
- User downloading photos, music, or videos
- Security risk due to user violation of acceptable use policy (AUP)
- Bring Your Own Device (BYOD)
Common Threats in the LAN Domain
- Unauthorized access to LAN
- Unauthorized access to systems, applications, and data
- LAN server operating system software vulnerabilities
- LAN server application software vulnerabilities and software patch updates
- Unauthorized access by rogue users on wireless LANs (WLANs)
- Compromised confidentiality of data on WLANs
- LAN servers with different hardware, operating systems, and software make them difficult to manage and troubleshoot
Common Threats in the LAN-to-WAN Domain
- Unauthorized network probing and port scanning
- Unauthorized access through the LAN-to-WAN Domain
- Denial of service (DoS)/distributed denial of service (DDoS) attacks
- IP router, firewall, and network appliance operating system vulnerability
- IP router, firewall, and network appliance configuration file errors or weaknesses
- Remote user download of sensitive data
- Download of unknown file type attachments from unknown sources
- Unknown email attachments and embedded URL links received by local users
- Lost productivity due to local users surfing the web
Common Threats in the WAN Domain (Internet)
- Open, public, and accessible data
- Most Internet traffic sent as cleartext
- Vulnerable to eavesdropping
- Vulnerable to malicious attacks
- Vulnerable to DoS and DDoS attacks, TCP synchronize (SYN) flooding, and IP spoofing attacks
- Vulnerable to corruption of information/data
- Insecure Transmission Control Protocol/Internet Protocol (TCP/IP) applications
- Hackers, attackers, and perpetrators email Trojans, worms, and malicious software
Common Threats in the WAN Domain (Connectivity)
- Commingling of WAN IP traffic on the same service provider router and infrastructure
- Maintaining high WAN service availability
- Maximizing WAN performance and throughput
- Using Simple Network Management Protocol (SNMP) applications and protocols maliciously (ICMP, Telnet, SNMP, DNS, etc.)
- SNMP alarms and security monitoring 24/7/365
Common Threats in the Remote Access Domain
- Brute-force user ID and password attacks
- Multiple logon retries and access control attacks
- Unauthorized remote access to IT systems, applications, and data
- Private or confidential data compromised remotely
- Data leakage in violation of data classification standards
- A mobile worker’s laptop is stolen
- Mobile worker token or other authentication stolen
Common Threats in the System/Application Domain
- Unauthorized access to data centers, computer rooms, and wiring closets
- Downtime of servers to perform maintenance
- Server operating systems software vulnerability
- Insecure cloud computing virtual environments by default
- Susceptibility of client-server and web applications
- Unauthorized access to systems
- Data breach where private data is compromised
- Corrupt or lost data
- Loss of backed-up data as backup media are reused
- Recovery of critical business functions potentially too time consuming to be useful
- Downtime of IT systems for an extended period after a disaster