Chapter 12 In Class Notes Flashcards
A person or organization that seeks to obtain
data or other assets illegally, without the
owner’s permission and often without the
owner’s knowledge
Threat
An opportunity for threats to gain access to
individual or organizational assets.
vulnerability
A measure that individuals or organizations
take to block the threat from obtaining an
asset.
Safeguards. Safeguards are not always effective.
Some threats achieve their goal in spite of
safeguards.
An asset that is desired by the threat.
Target
SOURCES OF THREATS? 3 of them
HUMAN ERROR
COMPUTER CRIME
NATURAL EVENTS AND
DISASTERS
Accidental problems caused by both
employees and nonemployees.
Procedures not followed
Increasing a customer’s discount
Incorrectly modifying employee’s salary
Placing incorrect data on company Web site
System errors
Systems working incorrectly
Programming errors
7
g g
IT installation errors
Faulty recovery actions after a disaster
Includes employees and former employees who
intentionally destroy data or other system
components.
Computer Crime
A technique for gathering unauthorized
information in which someone pretends to be
someone else.
Pretexting
When someone pretends to be
someone else with the intent of obtaining
unauthorized data.
Spoofing
A type of spoofing whereby an
intruder uses another site’s IP address as if it were
that other site.
IP Spoofing
What is needed for your reset password information?
Victim’s Email Address
Answer to victim’s security question!
A technique for intercepting computer
communications.
Sniffing. With wired networks, sniffing
requires a physical connection to the network.
With wireless networks, no such connection is
required.
People who take computers
with wireless connections through an area an
search for unprotected wireless networks in an
attempt to gain free Internet access or to gather
16 unauthorized data.
Drive by sniffer
A form of computer crime in which a person gains
unauthorized access to a computer system.
Hacking. Although
some people hack for the sheer joy of doing it, other
hackers invade systems for the malicious purpose of
stealing or modifying data.
Occurs when unauthorized programs invade a
computer system and replace legitimate programs.
Such unauthorized programs typically shut down
the legitimate system and substitute their own
processing.
Usurpation
A computer program that senses when another
computer is attempting to scan the disk or
otherwise access a computer.
Intrusion Detection System (IDS)
Management’s policy for computer security,
consisting of a general statement of the
organization’s security program, issue-specific
policy, and system-specific policy.
Security Policy
What Are the Elements of a
Security Policy? 3 of them
- General statement of organizations security program
- Issue-specific policy
- System-specific policy
threats & consequences we know about
risk
things we do not know that we do not know
Uncertainty
The “bottom line” of risk assessment; the likelihood of loss multiplied by the cost of the loss consequences (both tangible and intangible).
Probable loss
• Given probable loss, what to protect?
• Which safeguards inexpensive and easy?
• Which vulnerabilities expensive to eliminate?
• How to balance cost of safeguards with benefits of
probable loss reduction?
You should ask these questions when making what kind of decision?
Risk-Management Decisions