Ch. 4 - Information Security and Controls Flashcards
Security
degree of protection against criminal activity, danger, damage, or loss
information security
processes & policies that protect information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction
threat
any danger to which a system may be exposed
exposure
exposure of an information resource is the harm, loss, or damage that can result if a threat compromises that resource
vulnerability
the possibility that a threat will harm the resource
5 factors contributing to vulnerability of organizational information resources
- today’s interconnected, interdependent, wirelessly networked business environment
- smaller, faster, cheaper computers + storage devices
- decreasing skills necessary to be a computer hacker
- international organized crime taking over cybercrime
- lack of management support
unintentional threats
- human errors
- social engineering
human errors
higher level employees + greater access privileges = greater threat
ex. HR and IS
examples of human mistakes
- carelessness with computing devices
- opening questionable emails
- careless internet surfing
- poor password selection and use
- carelessness with one’s office
- carelessness using unmanaged devices
- carelessness with discarded equipment
- careless monitoring of environmental hazards
social engineering
attack where the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords
ex. Kevin Mitnick (famous hacker)
deliberate threats
- espionage / trespass
- information extortion
- sabotage or vandalism
- theft of equipment or information
- identity theft
- compromises to intellectual property
- software attacks
- alien software
- supervisory control and data acquisition (SCADA) attacks
- cyberterrorism and cyberwarfare
virus
segment of computer code that performs malicious actions by attaching to another computer program
worm
segment of computer code that performs malicious actions and will replicate, or spread by itself (without requiring another computer program)
phishing attack
uses deception to acquire sensitive personal information by masquerading as official-looking emails or instant messages
spear phising
targets large groups of people
- perpetrators find as much information on the individual, tailoring their phishing attacks to improve the chances they will obtain sensitive, private information