Final Flashcards
(40 cards)
Boundary type
IT Security
hardware, software and communication networks can extend to VPN, web browsing, and database
Physical Security
secured vaults, strong building walls and containers
Standards
IT Security information systems in the organization best in class IT security standard for interoperability
Physical Security
Infrastructure of the organization plays an important role in providing physical security for the organization
Maturity
IT Security
The IT security products are developed rapidly
Physical Security
products are not developed rapidly rather they are used for longer periods
Frequency of attacks
IT Security
attack against is very high in nature and the attack will be repeated often to test the resolve of the organization
Physical Security
is very low in nature and the attack is not repeated often
Attack responses
IT Security
managed by the incident response teams by updating the software patches and using some other security control mechanisms
Physical Security
managed by the incident response teams by fixing the vulnerability which led to the attack and updating the firmware
Risk to attackers
IT Security
cannot be traced and it is sophisticated operation
Physical Security
can be traced easily and they can be punished
Evidence of compromise
IT Security
Evidence against copy of data cannot be traced
Physical Security
Physically stolen items can be noticed easily
Article 2 Illegal access
CT, CSD, CCT
the data depends upon the access of whole computer system
“data confidentiality” the system cannot be accessed without rights
Article 3 Illegal interception
CT
it focuses on the transmission of computer data within the computer system
data confidentiality” the system cannot be accessed without rights
Article 4 Data interference
CT
the article 4 is going to damage, deletes or suppress the computer data
data integrity” the unauthorized users can damage, delete or modify the data without having the rights
Article 5 System interference
CT
without having the right of the computer system, it holds back the computer data by transmitting, damaging
“Data integrity”, “Data confidentiality”, “and data privacy”
Article 6 Misuse of devices
CCT
and access code used in the computer system are used for the purpose of offences
“data availability”
Article 8 Computer-related fraud
CCT
the computer data is modified, deleted or suppressed that result in inauthentic data
data integrity or data privacy”
Article 9 Offenses related to child pornography
CCT
There is no attack on the child pornography
Article 10 Infringements of copyright and related rights
CCT
it produces, offers or distributes the data through computer system from one person to another person
“data integrity or data privacy”
Article 11 Attempt in aiding or abetting
CCT
there is no attack in aiding the commission of offenses
Virus, worms or other malicious code
CT, CSD, CCT
depends upon what use is made of the attack
Unauthorized access to/use of information, systems or networks
CT, CSD, CCT
depends upon what use is made of the attack
Illegal generation of spam e-mail
CCT
crime attacks on “data confidentiality”
Spyware
CCT
Denial of service attacks
CT
crime attacks on “data availability”
Fraud
CCT
crime attacks on “data confidentiality”
Phishing
CT
crime attacks on “data privacy”
Theft of other (proprietary) info including customer records, financial records
CT
crime attacks on “data privacy”