Chapter 11 - Mgmt Issues in Info Security Flashcards
What is Info Security?
More than just preventing HW and SW from crashing
- set of practices to keep data secure from unauthorized access
- both when stored or being transferred
- Keeps the company operating
What is the goal of info security?
Ensure data integrity and business contuity
What are security threats?
Many different forms including
- software attacks
- theft of intellectual property
- identity theft
- theft of info or equipment
- sabatoge
- extorsion
What are some rising trends in security threats?
- rising password misuse leading to unauthorized logins
- social engineering
Trends and types of threats will be different depending on the country
What are some examples of data theft?
- employee illegally access emails to extract info for malicious intent
- employee angry about low bonus brings down comp system by deleting data records
- unhappy administrator changes code of legacy systems and creates bad data
- ## marketing salesman sells data
What is the scope of secutiy mgmt?
Personnel security - who has access, modify data
Applixation secutiy - security of app
OS security - protecting OS from threats
Network security - prevent unauthirzed access of computer network
Web services securtiy - preventing web services from attacks
Facitlity security
What are some common attacks?
Virus - comp programs that appear to perform a task but hidden malware
Sniffing - monitor network traffic reading messages
Spoofing - pretending to be a legit site
Denial of service - flooding a service until it crashes
Phishing - email or website attempting to obtain personal info
Playing middleman - positions between user and application, appear normal exchange of info.
What are the five pillars of info sec?
1) Authentication
2) Identification
3) Privacy
4) Data Integrity
5) Non-repudiation - proof a transaction occured
What are technical countermeasures?
Used to protect the confediality and integrity of data.
They are a wide variety of measures available at every level of the tech stack
What are some easy ways to increase security?
- adding additional security measures
- removing unneeded services
- hardening systems
- limiting access
What are some tools to increase security?
- Firewalls
- Encyption
- VPNs (cheapter, doesnt provide 100% end-to-end security)
What are the most common info sec tools?
Firewalls - controls access between networks, filters illegal message packets
Encryption - secret key (e.g. DES), public key (e.g. RSA, used in web browsers, basis of RSA)
VPNs - use tunneling and encryption (uninterruptable pathway and encrypted messages ) to keep data secure
Anti-virus software
Anit-spyware sw
What are some management countermeasures?
- computer auditing - making sure programs do what they are supposed to do
- computer monitoring - searching for security loopholes
- economic evaluation of security measures - done by conducting cost/benefit anal of countermeasures
What are security loopholes?
Vulnerability is software, particularly in OS
What is the first weapon for prevention and recovery of damage from security threats?
Establishing a bus continuity plan