Chapter 12 - Security Flashcards
Vulnerability
An opportunity for threats to gain access to individual or organizational assets.
Threat
Person or organization that seeks to obtain or alter data or other assets illegally, without the owner’s permission and often without the owner’s knowledge.
Safeguard
Some measure that individuals or organizations take to block the threat from obtaining the asset.
Target
The asset that is desired by the threat.
Three Sources of Threats
- Human Error
- Computer Crime
- Natural Disasters
Five Types of Security Loss
- Unauthorized Data Disclosure
- Incorrect Data Modification
- Faulty Service
- Denial of Service
- Loss of Infrastructure
Usurpation
Computer criminals invade a computer and replace legitimate programs with their own, unauthorized ones.
Advanced Persistent Threat (APT)
Sophisticated, possibly long-running, computer hack that is perpetrated by large, well-funded organizations such as governments. A means to engage in cyber warfare. Examples are Stuxnet and Flame.
Intrusion Detection System (IDS)
A computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
Gramm-Leach-Bliley Act
Protects consumer financial data stored by financial institutions.
Privacy Act of 1974
Protects records of individuals held by the U.S. Government.
HIPAA
Health Insurance Portability and Accountability Act. Gives individuals the right to access health data and sets rules and limits on who can read and receive your health information.
Identification
User name
Authentication
Password, smart card with pin, biometric authentication.
Biometric Authentication
Uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users.