ISMN Exam 2 Flashcards

(48 cards)

1
Q

GDPR (General Data Protection Regulation)

A

Toughest privacy and security law in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security

A

Degree of protection against criminal activity, danger, damage, loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Security

A

All the processes and policies designed to protect and organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat to an information resource

A

Any danger to which a system may be exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exposure of Information Resource

A

Harm, loss, damage that can result if a threat compromises that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability to a information resource

A

Possibility that a threat will harm that will harm that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 key contributors to the increasing vulnerability of organizational informational resources:

A
  • Interconnected, wirelessly networked business environment
  • Smaller, faster, cheaper computers/devices
  • Decreasing skills necessary to be a computer hacker
  • Int’l organized crime becoming cybercrime
  • Lack of management support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Espionage/Trespass

A

Attacker/unauthorized individual attempts to gain illegal access to organizational information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Extortion

A

Attacker threatens to steal or actually steals information from a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sabotage/Vandalism

A

Deliberate acts that involve defacing an organization’s website [web defacement attack]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intellectual Property

A

Property created by individuals or corporations that is protected under trade secret, patent, and copyright laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity Theft

A

Deliberate assumption of another person’s identity, usually to gain access to his/her financial information or to frame them for a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

Malicious software designed to wreak havoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do Viruses do?

A

Damage programs, delete files, reformat hard drives and/or restrict access to programs/internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do Worms do?

A

Self replicate & spread to other computers (modifies/deletes files and/or depletes
system resources [hard drive space / bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ransomware

A

[Form of digital extortion]
Blocks access to an individual computer or an organization’s computer system/network
Encrypts an organization’s data until the organization pays a sum
of money (usually in bitcoin).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Doxxing

A

Sometimes, rather than threatening to delete data if ransom isn’t
paid, cybercriminals threaten to release the data to the public
(private / sensitive customer data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Botnets

A

collection of infected computers [bots] controlled by a remote player [bot
master/herder]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Distributed Denial of Service (DDoS)

A

Aims to make a website or network unusable by
flooding it with malicious traffic or data from multiple infected computers [botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Phishing Attacks

A

Use deception to acquire sensitive personal information by masquerading
as official-looking e-mails, instant messages or tex

21
Q

Spear Phishing Attacks

A

Personalized phishing attacks that target specific individuals or
organizations

22
Q

Whale Phishing Attacks

A

Spear phishing towards high-value individuals to steal sensitive info from
companies (usually targeting executives and HR department

23
Q

Alien Software (Pestware)

A

Adware, spyware, Spamware, cookies
software secretly installed on a computer without the knowledge of the user
Typically, not as malicious as viruses/worms – mainly used for advertising/marketing
Allows others to track your web surfing habits and other personal behaviors

24
Q

Spyware

A

collects personal information about users without their consent

25
Keystroke loggers (keyloggers)
Records your keyboard strokes & internet browsing history
26
Screen scrapers
record a “movie” of screen contents and activities
27
Stalkerware
Powerful surveillance functions which include keylogging, making screenshots, monitoring internet activity, recording location, recording video and phone calls, and intercepting app (Skype, Facebook, WhatsApp, Snapchat iMessage,etc) communications
28
Spamware
sends unsolicited emails to everyone in your email address book that looks like it came from you. Mainly used for advertising but can include viruses/worms
29
Adware
Software that causes pop-ups
30
SCADA (Supervisory Control and Data Acquisition attacks)
Attacks big power grids and other infrastructure
31
Cyberterrorism/warfare
Use computer systems to harm real people/places, often for political agenda
32
Single Most Valuable Control is
User Education and Training
33
3 major ways companies protect against threats
Education Information Security Controls Risk Management
34
Information Security Controls
Designed to protect all of the components of an information system – including data, software, hardware, and networks.
35
3 main types of Information Security Control
Physical Controls Access Controls Communications Controls
36
Firewalls
Systems that prevent unauthorized internet users from accessing private networks
37
Anti-Malware Systems (Antivirus software):
Software that attempts to identify and eliminate viruses, worms and other malicious software.
38
Whitelisting
Process in which a company (IT Dept) identifies the only applications/websites that it will allow to run/access on
39
Blacklisting
process in which a company IT Dept identifies applications/websites that it will not allow to run/access on computers
40
Encryption
process of converting (scrambling) an original message into a form that cannot be read by anyone except the intended receiver Uses a public key (locking) and private key (unlocking) Digital Certificates (certified by a 3rd party certificate authority)
41
Virtual Private Network (VPN)
private/secure network (out on the internet) that remote users (internal employees/external vendors/customers) can connect to & access/share information.
42
Transport Layer Security (TLS)
Secures transactions on the internet (credit card purchases/online banking); encrypts and decrypts data between a Web server and browser
43
Employee Monitoring Systems
proactive approach of protecting against human mistakes. Monitors e-mail activities & internet browsing activities.
44
Information System Auditing
Examination of information systems, their inputs, outputs, and processing. Considers all the potential hazards and controls in information systems. Focuses on issues such as operations, data integrity, software applications, security and privacy, budgets & expenditures, cost control, and productivity.
45
What affects your organization’s cyber insurance costs?
Size and Industry * Amount and Sensitivity of Data * Annual Revenue * Strength of Information Security Measures
46
Functions of Risk Mitigation
Implementing controls to prevent identified threats from occurring (protect it from happening) * Developing a means of recovery if the threat becomes a reality (steps to take if it does happen)
47
3 Steps of Risk Analysis
Assessing the value of each asset being protected * Estimating the probability that each asset will be compromised * Comparing the probable costs of the asset’s being compromised with the costs of protecting the asset
48
3 most common Risk Mitigation strategies:
Risk Acceptance Risk Limitation Risk Transference (Insurance)