CH 19 in class concepts Flashcards

1
Q

What happend to Equifax?

A

Largest data breach in summer of 2017; credit card numbers, SSN, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happened with Target?

A

Hackers installed malware in Target’s security system in 2013; credit cards stolen and other personal info that led to largest ever decline in transactions, profits, lawsuits, and CEO’s dismissal.

Paid for software security and ignored warnings. They turned off the function to automatically delete malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why is security a top organizational priority?

A

security breach can lead to financial loss, exposed info, court costs, and damaged reputations. it is important to determine whether firm has technologies, training, policies and procedures to assess risks, lessen damage, and respond in the event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

why do data breaches happen?

A

data harvesters steal data and sell it. Cash-out fraudsters purchase data from data harvesters and use for financial gain (buy goods with stolen credit cards.

cyberwarfare can become a legit, physical threat despite being software. white hat hackers show this bydemonstrating that they can affect the temperature of an oil refinery and cause an explosion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is the government psying on you?

A

many US government agencies had data-monitoring efforts for more pervasive than many realized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a hacker good or bad?

A

can be both; could be someone who breaks into a computer or a particularly clever programmer.

white hat hackers uncover computer weaknesses without exploitation. they contribute to improving system security and share their knowledge in hopes that security will be improved. black hat hackers, on the other hand, are criminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

user and administrator threats

A

bad apples - dishonest employees who steal secrets, insteall malware, or hold a firm hostage

social engineering - con games to trick employees into revealing info or performing other tasks that compromise a firm (impersonation, charm, harrasment/guilt/intimidation, befriending, etc)

passwords - inefficient and insecure password systems, though sites force regular password changes, users only make minor tweaks; multi-factor authentication and biometrics to measure human body characterestics to identify and authenticate, offer more security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

technology threats

A

malware compromises computing system without permission via viruses worms, and trojans.

viruses - infect other software or files

worms - programs take advantage of security vulnerability to automatically spreas; unlike viruses, do not require an executable

trojans - misleads users by disguising as a standard program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the encryption prescription

A

deploying encryption dramatically lowers potential damage from lost or stolen laptops or from hardware recovered from dumpster diving. encryption scrambles data using a code, hiding it from those who cannot unlock it with a key. brute force attacks tries every possible password combination to break into an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can users do to protect their data?

A

regularly back up system, dispose of sensitive invormation in a smart way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what can an organization do to protect their systems and data?

A

follow framworks, stnadards, and compliance

education, audit, and enforcement

technology standpoint: patches that plug existing holes, lock down hardware and lock down networks (firewalls, blacklists, whitelists, honeypots, intrusion detection systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly