Ch. 4 - Information Security and Controls Flashcards

1
Q

Security

A

degree of protection against criminal activity, danger, damage, or loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

information security

A

processes & policies that protect information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

threat

A

any danger to which a system may be exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

exposure

A

exposure of an information resource is the harm, loss, or damage that can result if a threat compromises that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

vulnerability

A

the possibility that a threat will harm the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

5 factors contributing to vulnerability of organizational information resources

A
  1. today’s interconnected, interdependent, wirelessly networked business environment
  2. smaller, faster, cheaper computers + storage devices
  3. decreasing skills necessary to be a computer hacker
  4. international organized crime taking over cybercrime
  5. lack of management support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

unintentional threats

A
  • human errors

- social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

human errors

A

higher level employees + greater access privileges = greater threat

ex. HR and IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

examples of human mistakes

A
  • carelessness with computing devices
  • opening questionable emails
  • careless internet surfing
  • poor password selection and use
  • carelessness with one’s office
  • carelessness using unmanaged devices
  • carelessness with discarded equipment
  • careless monitoring of environmental hazards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

social engineering

A

attack where the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords

ex. Kevin Mitnick (famous hacker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

deliberate threats

A
  • espionage / trespass
  • information extortion
  • sabotage or vandalism
  • theft of equipment or information
  • identity theft
  • compromises to intellectual property
  • software attacks
  • alien software
  • supervisory control and data acquisition (SCADA) attacks
  • cyberterrorism and cyberwarfare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

virus

A

segment of computer code that performs malicious actions by attaching to another computer program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

worm

A

segment of computer code that performs malicious actions and will replicate, or spread by itself (without requiring another computer program)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

phishing attack

A

uses deception to acquire sensitive personal information by masquerading as official-looking emails or instant messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

spear phising

A

targets large groups of people

  • perpetrators find as much information on the individual, tailoring their phishing attacks to improve the chances they will obtain sensitive, private information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

denial-of-service attack

A

attacker sends so many information requests to a target computer system that the target cannot handle them successful and typical crashes (ceases to function)

17
Q

distributed denial-of-service attack

A

attacker takes over many computers. These computers are called zombies or bots. The attacker uses bots to deliver coordinated stream of information requests to a target computer, causing it to crash

18
Q

trojan horse

A

software programs that hide in other computer programs and reveal their designed behaviour only when they are activiated

19
Q

back door (trap door)

A

typically a password (known only to the attacker), allowing them to access a computer system at will, without having to go through any security procedures

20
Q

logic bomb

A

segment of computer code that is embedded within an organizations existing computer programs and is designed to activate and perform a destructive action under specific conditions, such as at a certain time or date

21
Q

alien software (pestware)

A
  • adware
  • spyware
    • ex. keyloggers, screen scrapers
  • spam ware
  • cookies
    • tracking cookies
22
Q

risk

A

probability that a threat will impact on information resources

23
Q

How to protect information resources

A
  • risk management
  • risk analysis
  • risk mitigation
24
Q

risk mitigation

A
  • risk acceptance
  • risk limitation
  • risk transference
25
Q

categories of control

A
  • control environment
  • general controls
  • application control
26
Q

control environment

A

encompasses management attitudes toward controls, as evidenced by management actions, as well as by stated policies that address:

  • ethical issues
  • quality of supervision
27
Q

physical controls

A

prevent unauthorized individuals from gaining access to a company’s facilities

ex. walls, doors, fencing, gates, locks, badges, guards, alarm systems, pressure/temperature/motion sensors

28
Q

access controls

A

logical controls (implemented by software) help to provide controls such as

  • authentication
  • authorization
29
Q

general controls

A

security is only one aspect of operational control (part of general controls)

30
Q

password controls

A
  1. control environment: policies that enforce the proper management of user codes and passwords
  2. general control: security system that requires a user ID and password to “log on”
  3. functional application control: separate passwords for sensitive functions
31
Q

authentication

A

something the user is, has, does and knows

ex. passwords

32
Q

communication controls

A
  • firewalls
  • anti-malware systems
  • whitelisting and blacklisting
  • encryption
  • virtual private networking
  • transport layer security (TLS)
  • employee monitoring systems
33
Q

application controls

A

controls that apply to individual applications

- input, processing and output

34
Q

business continuity planning (BCP)

A
  • provide continuous availability
  • be able to recover in the event of a hardware or software failure or attack
  • ensure that critical systems are available and operating
35
Q

disaster recovery plan

A

how to respond to unintentional hazards

  • hot site
  • warm site
  • cold site