Ch 4-Risk Management and Info security Flashcards
security
A degree of protection against criminal activity, danger, damage, or loss
- Information security
Processes & policies that protect information and systems from unauthorized access, use, disclosure,
disruption, modification, or destruction
- Threat
- Any danger to which a system may be exposed
- Exposure
*
Exposure of an information resource is the harm, loss, or damage that can result if a threat compromises
that resource
- Vulnerability
- Is the possibility that a threat will harm that resource
what 5 things make todays info resources vulnerable
1) interconnected interdependant business environemnt
2) smaller faster cheaper computers and storage devices
3) decreasing skills needed to be a hacker
4) intl org crim taking over cybercrime
5 )lack of management support
human error
who poses higher risk in employee hierarchy
higher level employees! they have greater access priveleiges= greater threate
what 2 areas in company structure pose signgiifcant threats
HR
IS
what are general areas of threats in a company
contract labour
consutlatntls
janiotrs
guards
what is social engingeering
An attack in which the perpetrator uses social skills to trick or manipulate
legitimate employees into providing confidential company information such as
passwords
what are deliberate threats to info systems
- Espionage or trespass
- Information extortion
- Sabotage or vandalism
- Theft of equipment or information
- Identity theft
- Compromises to intellectual property
- Software attacks
- Alien software
- Supervisory control and data acquisition (SCADA) attacks
- Cyberterrorism and cyberwarfare
what is alien softawre (pestware)
adware
spyware
spameware
cookies
what are orgs trying to do to protect info resources
risk: prob that a threat will impact aninfo resource
THEY DO RISK MANAGEMENT, ANALYSIS, MITIGATION
what is risk mitigation
risk acceptance, risk limitation, risk transference
acceptance: accept potential risk, absord damages
limitation: implement control to minimize impact
transferance: transfer the risk by getting insurance
what are categories of controls
control environment
general controls: security controls
application controsl
control environment
Encompasses management
attitudes toward controls,
as evidenced by
management actions, as
well as by stated policies
that address:
* Ethical issues
* Quality of supervision
what are physical controls
- Prevent unauthorized individuals from gaining access to a company’s facilities
Examples:
* Walls, doors, fencing, gates, locks
* Badges, guards, alarm systems
* Pressure sensors, temperature sensors, motion sensors
what are access controls
- Logical controls (implemented by software) help to provide controls such as:
- Authentication
- Authorization
can be physical or logical controls (softare)
Access & Communications Controls Help to Prevent
Identity Theft
Using confidential information such as passwords, drivers
licences, or medical records to assume someone else’s identity
* The thief applies for credit cards, mortgages, or passports
* Example controls include: physical security, access security, and
encryption
* The Office of the Privacy Commissioner of Canada tells
businesses how to reduce the risk of identity theft and how to
respond (priv.gc.ca/en)
Password Controls Need to be Supported at All 3 Control
Levels
1.Control environment: Policies that enforce the proper
management of user codes and passwords
2.General control: A security system that requires a user ID and
password to “log on”
3.Functional application control: Separate passwords for
sensitive functions, e.g., employee raises or write-off of
customer accounts
Authentication
- Something the user is
- Something the user has
- Something the user does
- Something the user knows
Communication Controls
- Firewalls: prevents specofic type of info moving
-dmz: between 2 fireawalls - Anti-malware systems/:
- Whitelisting and blacklisting
- Encryption
- Virtual private networking
- Transport layer security (TLS)
- Employee monitoring systems
Application Controls
- Controls that apply to individual
applications (functional areas), e.g.,
payroll - The text describes three categories:
input, processing, output - It is more common to consider the
purpose of application controls for
input, processing, and output using:
accuracy, completeness,
authorization, and an audit trail
(documentation)
EXAMPLES OF APPLICATION CONTROLS
* Input: Edits that check for
reasonable data ranges (accuracy)
* Processing: Automatically check that
each line of an invoice adds to the
total (accuracy for total and
completeness of line items)
* Output: Supervisor reviews payroll
journal for unusual amounts
(exceptions) before cheques are
printed (authorization)
Business Continuity Planning (BCP)
* Disaster recovery plan
* Hot site
* Warm site
* Cold site
- BCP’s purpose:
- Provide continuous availability
- Be able to recover in the event of
a hardware or software failure or
attack (e.g., due to ransomware) - Ensure that critical systems are
available and operating