CH04 - Information security and controls Flashcards
What is a rogue access point?
unauthorized access point to a WLAN
What is an evil twin attack?
An imposter with a computer connects to your computer pretending to be your normal access point
What is war driving?
walking around to find unsecure WLANS to connect to
What is eavesdropping?
Trying to access data traveling over wireless networks
5 key factors that increase the vulnerability and impact security of organizational information resources:
- Today’s interconnected, interdependent, wirelessly networked business environment;
- Smaller, faster, cheaper computers and storage devices;
- Decreasing skills necessary to be a computer hacker
;4.International organized crime taking over cybercrime;
5.Lack of management support
What are the 2 main types of information security threats
Unintentional and deliberate
What is information security?
All of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction.
What is a threat to an information resource?
any danger to which a system may be exposed
Define exposure of an information system
the harm, loss, or damage that can result if a threat compromises that resource.
Give at least 4 manifestations of human error
- Carelessness with device
- Opening questionable e-mails
- Poor password use and selection
- Carelessness with one’s office
- Carelessness using unmanaged devices
- Carelessness with discarded equipment
- Carelessness monitoring of environmental hazard
Define social engineering and name its 3 forms
Attack where the person uses social skills in order to get an employee to provide confidential company information
- Impersonation: pretending to be a company manager of an IS employee
- Tailgating: following an employee to enter restricted areas
- Shoulder surfing: watching over someone’s shoulder to peek at private information
Give 4 deliberate threats to IS
- Espionage or trespass
- Information extortion
- Sabotage or vandalism
- Theft of equipment or information
- Identity theft6.Compromises to intellectual property
- Software attacks
- Alien software
- Supervisory control and data acquisition (SCADA) attacks
- Cyberterrorism and cyberwarfare
Explain what you know of espionnage or trespass
- Unauthorized individual attempts to access organizational information illegally
- Competitive intelligence: legal information-gathering techniques
- Ex: studying a company’s website > hiring page > new projects
- Industrial espionage crosses the legal boundaries
Explain what theft of equipment or information is
- Small, powerful devices with increased storage are easier to steal or easier to use to steal info
- Dumpster diving: going through industrial thrash to find organizational information.
Name the main causes of identity theft
- stealing mail or dumpster diving;
- stealing personal info. in computer databases;
- infiltrating organizations that store large amounts of personal information
- impersonating a trusted organization in an electronic communication (phishing).
What is a virus?
Segment of a computer code that performs malicious actions by attaching to another computer program