Chapter 12: Managing Information Security and Privacy Flashcards

1
Q

Identity Theft

A

Stealing, misrepresenting, or hijacking the identity of another person or business

vital information, such as a person’s name, address, date of birth, social insurance number, and mother’s maiden name, are often all that is needed to facilitate impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Personal Information Protection and Electronic Documents Act (PIPEDA)

A

In Canada, PIPEDA gives individuals the right to know why an organization collects, uses, or discloses their personal information

PIPEDA does not, however, facilitate individuals suing organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secruity threats

A

A problem with the security of information or the data therein, caused by human error, malicious activity or natural disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three sources of security threats

A

(1) human error and mistakes,
(2) malicious human activity,
(3) natural events and disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Human errors and mistakes

A

Include accidental problems caused by both employees and others outside the organization.

An example is an employee who misunderstands operating procedures and accidentally deletes customer records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malicious human activity

A

This category includes employees and others who intentionally destroy data or other system components. It also includes hackers who break into a system, virus and worm writers who infect computer systems, and people who send millions of unwanted emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spam

A

Unwanted email messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Natural events and disasters

A

Category includes fires, floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature or accidents.

Problems in this category include not only the initial loss of capability and service but also losses stemming from actions to recover from the initial problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Five types of security problems

A

(1) unauthorized data disclosure,
(2) incorrect data modification,
(3) faulty service,
(4) denial of service,
(5) loss of infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unauthorized data disclosure

A

Can occur by human error when someone inadvertently releases data in violation of policy.

An example at a college or university would be a new department administrator who posts student names, numbers, and grades in a public place

In Canada, this type of disclosure is covered by PIPEDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pretexting

A

Occurs when someone deceives by pretending to be someone else.

A common scam involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

technique for obtaining unauthorized data, and it uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, social insurance numbers, account passwords, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spoofing

A

term for someone pretending to be someone or somewhere else. If you pretend to be your professor, you are spoofing your professor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP spoofing

A

occurs when an intruder uses another site’s IP (Internet Protocol) address as if it were that other site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sniffing

A

technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

drive-by sniffers

A

simply access computers with wireless connections through an area and search for unprotected wireless networks. They can monitor and intercept wireless traffic at will.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Incorrect Data Modification

A

Incorrectly increasing a customer’s discount or incorrectly modifying an employee’s salary, earned days of vacation, or annual bonus are actions that might fall under this category

can occur through human error when employees follow procedures incorrectly or when procedures have been incorrectly designed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hacking

A

when a person gains unauthorized access to a computer system. Although some people hack for the sheer joy of doing it, other hackers invade systems for the malicious purpose of stealing or modifying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Faulty Service

A

Includes problems due to incorrect system operations. Faulty service encompasses incorrect data modification, as well as systems that incorrectly send the wrong order to customers, programs that incorrectly bill customers, and software that sends erroneous information to employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

denial of service (DOS)

A

Security problems in which users are not able to access an information system; can be caused by human errors, natural disaster, or malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Loss of Infrastructure

A

Examples are a bulldozer cutting fibre-optic cables, or the maintenance staff unplugging an important device in order to plug in a vacuum cleaner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A security program has three components:

A

(1) senior management involvement,
(2) safeguards of various kinds,
(3) incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

(1) senior management involvement,

A

First, senior management must establish the security policy. This policy sets the stage for the organization’s response to security threats.

Senior management’s second function, therefore, is to manage risk by balancing the costs and benefits of the security program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Technical safeguards

A

involve the hardware and software components of an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

primary technical safeguards

A

1) identification and authentication
2) Encryption
3) Firewalls
4) Malicious protection
5) Design for secure applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

1) identification and authentication

A

Every non-trivial information system should require some form of authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

identification

A

The process whereby an informing system identifies a user by requiring the user to sign on with a user name and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

authentication

A

The process whereby an information system approves (authenticates) a user by checking the user’s password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

authentication methods fall into three categories:

A

(1) what you know (password or PIN),
(2) what you have (smart card),
(3) what you are (biometric).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Passwords

A
  • users tend to be careless in their use
  • users tend to be free in sharing their passwords with others
  • many users choose ineffective, simple passwords or use the same password for many systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Smart card

A

Plastic card that is similar to a credit card. Unlike credit, debit, and ATM (automatic teller machine) cards, which have a magnetic strip, smart cards have a microchip. The microchip holds far more data than a magnetic strip and has identifying data or algorithms.

32
Q

personal identification number (PIN)

A

Form of authentication whereby the user supplies a number that only they know

33
Q

challenge-response authentication

A

Form of authentication that uses a varying form of numeric question and algorithmic response (usually involving sophisticated computerized tokens) to validate users

34
Q

Biometric authentication

A

uses personal physical characteristics, such as fingerprints, facial features, and retinal scans, to authenticate users.

35
Q

malware

A

malware includes viruses, worms, Trojan horses, spyware, and adware

Broad definition, has many def’s

36
Q

Spyware

A

Programs are installed on the user’s computer without the user’s knowledge or permission. Spyware resides in the background and, without the user’s knowledge, observes the user’s actions and keystrokes, monitors computer activity, and reports that activity to sponsoring organizations

37
Q

Adware

A

Similar to spyware in that it is installed without the user’s permission and resides in the background to observe user behaviour. Most adware is benign in that it does not perform malicious acts or steal data. It does, however, watch user activity and produce pop-up ads

38
Q

Malware Safeguards

A

1) Install antivirus and anti-spyware programs
2) Set up your anti-malware programs to scan your computer frequently.
3) Update malware definitions
4) Open email attachments only from known sources
5) Promptly install software updates from legitimate sources.
6) Browse only in reputable Internet neighbourhoods

39
Q

Malware definitions

A

patterns that exist in malware code—should be downloaded frequently. Anti-malware vendors update these definitions continually, and you should install these updates as they become available.

40
Q

Data safeguards

A

Steps taken to protect databases and other organizational data by means of data administration and database administration

41
Q

Two organizational units are responsible for data safeguards

A

1) data administration

2) database administration

42
Q

Data administration

A

refers to an organization-wide function that is in charge of developing data policies and enforcing data standards

typically a staff function reporting to the chief information officer (CIO).

43
Q

Database administration

A

refers to a function that pertains to a particular database.

The enterprise resource planning (ERP), customer relationship management (CRM), and supply chain management (SCM) databases each have a database administration function

44
Q

key escrow

A

Control procedure whereby a trusted party is given a copy of a key used to encrypt database data

45
Q

Human safeguards

A

involve the people and procedures components of information systems. In general, human safeguards result when authorized users follow appropriate procedures for system use and recovery.

46
Q

Position Definitions

A

Effective human safeguards begin with creating definitions of job tasks and responsibilities.

In general, job descriptions should provide a separation of duties and authorities.

47
Q

Hiring and Screening

A

Security considerations should be part of the hiring process. Of course, if a position involves no sensitive data and no access to information systems, then screening for information systems security purposes will be minimal.

48
Q

Dissemination and Enforcement

A

Employees cannot be expected to follow security policies and procedures that they are not aware of. Therefore, employees need to be made aware of the security policies and procedures and of their responsibilities.

49
Q

Enforcement consists of three interdependent factors:

A

(1) responsibility,
(2) accountability,
(3) compliance

50
Q

Termination

A

Standard human resources policies should ensure that system administrators receive notification in advance of the employee’s last day so that they can remove accounts and passwords

51
Q

Human Safeguards for Non-employees

A

Business requirements may necessitate opening information systems to non-employees—temporary personnel, vendors, partner personnel (employees of business partners), volunteers, and the public.

52
Q

Hardening a site

A

means to take extraordinary measures to reduce a system’s vulnerability. Hardened sites use special versions of the operating system and lock down or eliminate operating system features and functions that are not required by the application

53
Q

Account Administration

A

The administration of user accounts, passwords, and help-desk policies and procedures is an important component of the security system.

54
Q

Account Management

A

Account management concerns the creation of new user accounts, the modification of existing account permissions, and the removal of unneeded accounts.

55
Q

System Procedures

A

normal operation, backup, and recovery

56
Q

Security Monitoring

A

Important monitoring functions are analysis of activity logs, security testing, and investigating and learning from security incidents.

57
Q

What Is Disaster Preparedness?

A

The best safeguard against a disaster is appropriate location

place computing centres, Web farms, and other computer facilities in locations not prone to floods, earthquakes, hurricanes, tornados, or avalanches

58
Q

Disaster Preparedness Guidelines

A

1) locate infrastructure in safe location
2) Identify mission-critical systems
3) Identify resources needed to run those systems
4) Prepare remote backup facilities
5) Train and rehearse

59
Q

hot sites

A

remote processing centres and may be run by commercial disaster-recovery services. For a monthly fee, they provide all the equipment needed to continue operations following a disaster and there may be minimal downtime or unavailability following a disaster

60
Q

Cold sites

A

provide space and limited technology and customers provide and install the equipment needed to continue operations following a disaster. Recovery time is considerably longer

61
Q

Warm sites

A

somewhere in the middle of the two extremes.

62
Q

Factors in Incident Response

A

1) Have plan in place
2) Centralized reporting
3) Specific responses (speed, preparation pays, dont make problems worse)
4) Practice

63
Q

____________________ provides useful information about what identity theft is and who to contact if it happens to you.

A

The Public Safety Canada website

64
Q

​Equifax, a global technology company specializing in proving credit scores and personal privacy​ protection, had a cybersecurity incident and​ 1,000,000 Canadian customers were impacted. Compromised personal information included all the​ following, except:

A

email addresses.

65
Q

An easy way to remember information systems safeguards is to arrange them according to the​ ______ components of an information system.

A

5

66
Q

What two critical factors do organizations need to address when responding to security​ threats?

A

security policy and risk management

67
Q

What should data administration define​ initially?

A

Data policies

68
Q

Which of the following is not an example of a data​ safeguard?

A

Virus protection

69
Q

The organizational function that pertains to developing and enforcing data policies and standards is called​ ________.

A

Data administration

70
Q

Which is the single most important safeguard that an individual computer user can​ implement?

A

Using strong passwords

71
Q

Human safeguards involve the​ ___________ and​ ___________ components of information systems.

A

people, procedure

72
Q

All the following are major disaster preparedness​ tasks, except:

A

Monitor security

73
Q

Preparing a​ ________________ facility is very​ expensive; however, the costs of establishing and maintaining that facility are a form of insurance.

A

backup

74
Q

​__________________ allows the organization to learn about security​ threats, take consistent actions in​ response, and apply specialized expertise to all security problems.

A

Centralized reporting

75
Q

​________ will enable an organization to determine whether it is under systemic attack or whether an incident is isolated.

A

Centralized reporting

76
Q

When an incident does​ occur, ____________ is of the essence.

A

speed