hh Flashcards

(66 cards)

1
Q

“The quality or state of being secure—to be free from danger”

A

Security

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of security

A

Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security

Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Critical Characteristics of Information

A

Availability
– Accuracy
– Authenticity
– Confidentiality
– Integrity
– Utility
– Possession

Availability
– Accuracy
– Authenticity
– Confidentiality
– Integrity
– Utility
– Possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of an Information System

A

Software
– Hardware
– Data
– People
– Procedures
– Network

Software
– Hardware
– Data
– People
– Procedures
– Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SDLC

A

Systems Development Life Cycle

Systems Development Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

methodology for design and implementation of information system within an organization

A

Systems Development Life Cycle (SDLC):

Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SLDC 6 general phrases

A

Investigation
Analysis
Logical design
Physical design
Implementation
Maintenance and change

Investigation
Analysis
Logical design
Physical design
Implementation
Maintenance and change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Preliminary cost-benefit analysis is developed

A

Investigation

determine what new system is expected to do and how it will interact with existing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

determine what new system is expected to do and how it will interact with existing systems

A

Analysis

Data support and structures capable of providing the needed inputs are identified

Creates and develops blueprints for information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data support and structures capable of providing the needed inputs are identified

A

Logical Design

Technologies to support the alternatives identified and evaluated in the logical design are selected

Components evaluated on make-or-buy decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technologies to support the alternatives identified and evaluated in the logical design are selected

A

Physical Design

Needed software created

Components ordered, received, and tested

Users trained and documentation created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Needed software created

A

Implementation

Longest and most expensive phase

Consists of tasks necessary to support and modify system for remainder of its useful life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Longest and most expensive phase

A

Maintenance and Change

Maintenance and Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information Security Project Team

A
  • A number of individuals who are experienced in one or more facets of required technical and nontechnical areas:
    – Champion
    – Team leader
    – Security policy developers
    – Risk assessment specialists
    – Security professionals
    – Systems administrators
    – End user

responsible for the security and use of a particular set of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

responsible for the security and use of a particular set of information

A

Data owner

ownership of ideas and control over the tangible or virtual representation of those ideas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

responsible for storage, maintenance, and protection of information

A

Data custodian

responsible for storage, maintenance, and protection of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

end users who work with information to perform their daily jobs supporting the mission of the organization

A

Data users

end users who work with information to perform their daily jobs supporting the mission of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an object, person, or other entity that represents a constant danger to an asset

A

Threat

an object, person, or other entity that represents a constant danger to an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

control over tangible/virtual ownership of ideas

A

Intellectual property (IP):

Intellectual property (IP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Malware attacks

A

Viruses
– Worms
– Trojan horses
– Logic bombs
– Back door or trap door
– Polymorphic threats
– Virus and worm hoaxes

Develops software scripts and program exploits

Usually a master of many skills

Will often create attack software and share with others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Develops software scripts and program exploits

A

Expert hacker

Many more unskilled hackers than expert hackers

Use expertly written software to exploit a system

Do not usually fully understand the systems they hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Many more unskilled hackers than expert hackers

A

TRUE

Unskilled hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

“cracks” or removes software protection designed to prevent unauthorized duplication

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

hacks the public telephone network

A

Phreaker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
much more sinister form of hacking
Cyberterrorism ## Footnote much more sinister form of hacking
26
Illegal taking of another’s physical, electronic, or intellectual property
Theft ## Footnote Illegal taking of another’s physical, electronic, or intellectual property
27
Acts or actions that exploits vulnerability (i.e., an identified weakness) in controlled system
Attacks ## Footnote
28
includes execution of viruses, worms, Trojan horses, and active Web scripts with intent to destroy or steal information
Malicious code ## Footnote includes execution of viruses, worms, Trojan horses, and active Web scripts with intent to destroy or steal information
29
transmission of a virus hoax with a real virus attached; more devious form of attack
Hoaxes ## Footnote transmission of a virus hoax with a real virus attached; more devious form of attack
30
Types of attacks
Types of attacks ## Footnote Back door Password crack Brute force: Dictionary: Denial-of-service (DoS): Distributed denial-of-service (DDoS) Spoofing: Man-in-the-middle: Spam Mail bombing: Sniffers Phishing: Pharming: Social engineering:
31
Back door
Back door ## Footnote gaining access to system or network using known or previously unknown/newly discovered access mechanism
32
attempting to reverse calculate a password
Password crack ## Footnote attempting to reverse calculate a password
33
trying every possible combination of options of a password
Brute force ## Footnote trying every possible combination of options of a password
34
selects specific accounts to attack and uses commonly used passwords (i.e., the dictionary) to guide guesses
Dictionary ## Footnote selects specific accounts to attack and uses commonly used passwords (i.e., the dictionary) to guide guesses
35
attacker sends large number of connection or information requests to a target Target system cannot handle successfully along with other, legitimate service requests May result in system crash or inability to perform ordinary functions
Denial-of-service (DoS): ## Footnote attacker sends large number of connection or information requests to a target Target system cannot handle successfully along with other, legitimate service requests May result in system crash or inability to perform ordinary functions
36
attacker sends large number of connection or information requests to a target
Distributed denial-of-service (DDoS) ## Footnote coordinated stream of requests is launched against target from many locations simultaneously
37
technique used to gain unauthorized access; intruder assumes a trusted IP address
Spoofing ## Footnote technique used to gain unauthorized access; intruder assumes a trusted IP address
38
attacker monitors network packets, modifies them, and inserts them back into network
Man-in-the-middle ## Footnote attacker monitors network packets, modifies them, and inserts them back into network
39
unsolicited commercial e-mail; more a nuisance than an attack, though is emerging as a vector for some attacks
Spam ## Footnote unsolicited commercial e-mail; more a nuisance than an attack, though is emerging as a vector for some attacks
40
also a DoS; attacker routes large quantities of e-mail to target
Mail bombing ## Footnote also a DoS; attacker routes large quantities of e-mail to target
41
program or device that monitors data traveling over network; can be used both for legitimate purposes and for stealing information from a network
Sniffers ## Footnote program or device that monitors data traveling over network; can be used both for legitimate purposes and for stealing information from a network
42
an attempt to gain personal/financial
Phishing ## Footnote
43
Spam
unsolicited commercial e-mail; more a nuisance than an attack, though is emerging as a vector for some attacks ## Footnote Example: Man-in-the-middle attacks can intercept sensitive information.
44
Mail Bombing
also a DoS; attacker routes large quantities of e-mail to target ## Footnote Example: Spam emails can overload a recipient's inbox.
45
Sniffers
program or device that monitors data traveling over network; can be used both for legitimate purposes and for stealing information from a network ## Footnote Example: Mail bombing can be used for network security monitoring.
46
Phishing
an attempt to gain personal/financial information from individual, usually by posing as legitimate entity ## Footnote Example: Sniffers can be used to steal login credentials.
47
Pharming
redirection of legitimate Web traffic (e.g., browser requests) to illegitimate site for the purpose of obtaining private information ## Footnote Example: Phishing emails often lead to fake login pages.
48
Social Engineering
using social skills to convince people to reveal access credentials or other valuable information to attacker ## Footnote Example: Pharming can involve impersonating a trusted individual.
49
Laws
rules that mandate or prohibit certain societal behavior ## Footnote Example: Social engineering tactics can manipulate human behavior.
50
Ethics
define socially acceptable behavior ## Footnote Example: Laws are enforced by legal authorities.
51
Cultural Mores
fixed moral attitudes or customs of a particular group; ethics based on these ## Footnote Example: Ethics guide decision-making in professional settings.
52
legal obligation of an entity extending beyond criminal or contract law; includes legal obligation to make restitution ## Footnote Example: Liability can result in financial compensation.
Liability
53
to compensate for wrongs committed by an organization or its employees ## Footnote Example: Liability insurance protects against legal claims.
Restitution
54
insuring that employees know what constitutes acceptable behavior and know the consequences of illegal or unethical actions ## Footnote Example: Restitution can involve disciplinary actions.
Due Care insuring that employees know what constitutes acceptable behavior and know the consequences of illegal or unethical actions ## Footnote Example: Restitution can involve disciplinary actions.
55
making a valid effort to protect others; continually maintaining level of effort ## Footnote Example: Due care involves proactive risk management.
Due Diligence
56
court's right to hear a case if the wrong was committed in its territory or involved its citizenry ## Footnote Example: Due diligence is essential in legal proceedings.
Jurisdiction
57
right of any court to impose its authority over an individual or organization if it can establish jurisdiction ## Footnote Example: Jurisdiction determines which court has legal authority.
Long-arm Jurisdiction
58
body of expectations that describe acceptable and unacceptable employee behaviors in the workplace ## Footnote Example: Policies set guidelines for employee conduct.
Policy
59
- Dissemination (distribution) - Review (reading) - Comprehension (understanding) - Compliance (agreement) - Uniform enforcement ## Footnote Example: Policy dissemination ensures all employees are informed.
Criteria for policy enforcement
60
Types of Law
Civil - Criminal - Private - Public ## Footnote Example: Different types of law govern various aspects of society.
61
governs nation or state; manages relationships/conflicts between organizational entities and people ## Footnote Example: Civil law covers disputes between individuals.
Civil
62
addresses violations harmful to society; actively enforced by the state ## Footnote Example: Criminal law punishes illegal actions.
Criminal
63
regulates relationships between individuals and organizations ## Footnote Example: Private law governs contracts between parties.
Private
64
regulates structure/administration of government agencies and relationships with citizens, employees, and other governments ## Footnote Example: Public law governs government operations.
Public
65
One of the hottest topics in information security - Is a “state of being free from unsanctioned intrusion” - Ability to aggregate data from multiple sources allows creation of information databases previously impossible ## Footnote Example: Privacy laws protect personal data.
Privacy
66
occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes ## Footnote Example: Identity theft can lead to financial loss.
Identity Theft