13. Information security Flashcards
How can you protect intellectual assets?
Information security
Downtime
Security threats
Hacker
Viruses
Hacker types
Black-hat hacker Cracker Cyberterrorist Hactivist Script kiddies or script bunnies White-hat hacker
Virus types
Backdoor program
Denial-of-service attack (Dos)
Distributed denial-of-service attack (DDoS)
Trojan-horse virus
How do computer viruses spread?
A hacker creates a virus and attaches it to a program, document, or website
The user downloads it (thinking the file is legitimate) and the virus infects other files and programs on the computer
Quickly the virus spreads in email attachments and shared files to co-workers and friends
The first line of defence
People
User awareness (PEOPLE)
Information security policies
Information security plan
The second line of defence
Technology
Authentication and authorisation
Identity theft
Phishing
Pharming
What does the most secure type of authentication involve?
Something the user knows (user ID and password)
Something the user has
Something that is part of the user (fingerprint or voice signature)
Prevention and resistance
Content filtering
Encryption
Firewalls
Intrusion detection software
Features full-time monitoring tools that search for patterns in network traffic to identify intruders