Week 10 Flashcards
What should a good ICT strategy consider about ICT risk?
Must look at risk as well as the advantages of the changes.
– Need for systematic processes to allow risk be
determined
– Need for plans to deal with problems
Fail to prepare - prepare to fail
Why is there an ICT security problem?
Increased convenience for users means increased convenience for people who
should not have access. The price we pay for this is increased security and
management of security.
Information systems are designed to share data and give resources to large amounts of people. networked computers are easier to access than standalone machines also.
What are the three steps to analyse a threat environment and act
Plan, Protect and respond if necessary
Describe how one can plan if they are in a threat enviornment in ICT
We need to consciously assess the risk in order to mitigate it.
Planning Principles:
Risk Analysis
Comprehensive
Security
Defence in depth
Minimum Permissions (dont forget to withdraw permissions)
Describe how one can protect if they are in a threat enviornment in ICT
Better to protect rather than to try to fix things up afterwards.
Involves using access controls, firewalls and crytography to keep people out
Companies spend most of their security effort here daily.
Describe how one can respond if they are in a threat enviornment in ICT
Even with great planning
and protection, incidents
will happen, and a
company must have a well- rehearsed plan for
responding. You can not anticipate everything.
Define malware
– A general name for evil software
– software intentionally designed to cause damage to
a computer, server, client, or computer network
Describe vulnerabilities and how they are dealth with by software providers
Vulnerabilities are security flaws in specific
programs. When vulnerabilities become known, then the software can up updated (patched)
to close off this vulnerability. This is why you have to keep both operating systems
and application software up to date.
What is a zero-day vulnerability
zero-day vulnerability is either unknown to the software vendors or a patch has
not yet been developed. Such vulnerabilities are very dangerous.
When a new zero-day vulnerability is identified a new patch is made available as
soon as possible, out of sequence to the usual update cycle
Whats the difference between vulnerability specific malware and universal malware
Vulnerability-specific malware requires a specific
vulnerability to be effective. ex: idea of climbing in through open window
Universal malware does not require a specific
vulnerability to be effective ex: vs breaking down the door.
Describe and define riskware
Riskware is software that is potentially
dangerous.
Usually offers some benefit at a “cost”
– Compromises security
– Acts illegally Riskware might
– Block another application
– Be used as a backdoor for other malware.
How can riskware be used in marketing
There is a grey area in riskware, where unwelcome advertisements etc may be installed on your computer, but these may not be strictly illegal.
Define social engineering attacks
Tricking the victim into doing something against his or her interests ex: spam phone calls
Define fraud attacks
Lying to the user to get the user to do something
against his or her financial self-interest. IT extends the range of fraud
Define spam attacks
Unsolicited
commercial e-mail. Often fraudulent containing links to websites or malware. Email spam is essentially free to send, so spammers send a million emails in the
hope than a handful of people will respond or click on the link. There are spam blockers but sometimes can block actual email
Define Phishing attacks
Sophisticated social
engineering attacks
with authentic-looking e-
mail or Website.
Wants user to enter
username, password,
and other sensitive
information. Link to website may look real as the text of the link does not need to be the same as the link. Phishers like spammers use mass-mailing and address collection techniques
What types of businesses are the biggest phishing targets?
Financial Institutions and cryptocurrency are an obvious target.
Email and social media sites provide a lot of information of use to criminals. and Payments sites
What are the traits of a phishing email?
- The email is designed to sound serious.
‘urgent action required’ - Poor spelling and grammar.
- A mismatched or dodgy URL.
The embedded link is not the same as the apparent link. - You are asked for sensitive information.
Why is SMS not as popular for spam or phishing?
Because it costs more and In SMS texts you cannot conceal a different URL behind text, so a fake URL
should be more obvious.
Define credit card theft online?
Credit Card Number Theft
– Performed by “carders”
– Make purchases with stolen credit card or steal from online account
Define identity theft online
– Collecting enough data to impersonate
the victim in large financial transactions
– May take a long time to restore the victim’s credit
rating
- Cane involved someone opening an account in your name without you knowing
Define corporate identity theft
In corporate identity theft, the attacker
impersonates an entire corporation
- Allow you order big quantities of goods etc on 30 days credit
- A lot of information about the company is public
Define vandalism and types of theft one can face in ICT
Vandalism/Sabotage:
– Deliberate damage to hardware, software and/or data, including companies’ websites
ICT can also mean: Physical theft – stealing hardware and software,
Data theft – stealing sensitive information or
making unauthorised changes to computer records
Why are disgruntled employees and en-employees dangerous
– Extensive access to systems, with privileges
– Knowledge about how systems work
– Knowledge about how to avoid detection
Business need to immediately withdraw network access if they dispense with the
services of an employee.