Chapter 14 Risks, Security, and Disaster Revcovery Flashcards
Goals of Information Security
- Protecting IT resources is a primary concern
- Securing corporate ISs is becoming increasingly challenging
Major goals of information security:
- Reduce the risk of systems ceasing operation
- Maintain information confidentiality
- Ensure the integrity and reliability of data resources
- Ensure the uninterrupted availability of resources
- Ensure compliance with policies and laws
- Laws passed by U.S. Congress setting standards for protecting privacy
- Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Sarbanes-Oxley Act of 2002 (SOX)
- Health Insurance Portability and Accountability Act of 1996 (HIPAA)
- CIA triad: foundational concepts of information systems security
- Confidentiality
- Integrity
- Availability
Major goals of information security
- Reduce the risk of systems ceasing operation
- Maintain information confidentiality
- Ensure the integrity and reliability of data resources
- Ensure the uninterrupted availability of resources
- Ensure compliance with policies and laws
Laws passed by U.S. Congress setting standards for protecting privacy
- Health Insurance Portability and Accountability Act of 1996 (HIPAA)
- Sarbanes-Oxley Act of 2002 (SOX)
CIA triad
foundational concepts of information systems security
- Confidentiality
- Integrity
- Availability
Risks to Information Systems
- Risks associated with cloud computing and data storage
- Downtime: the period of time during which an IS is not available
- $26 billion lost annually in the U.S. due to downtime
- Costs of downtime vary depending on industry, the size of the company, and other factors
Risks to Hardware
- The #1 cause of system downtime is hardware failure
- Major causes of hardware damage
- Natural disasters
-Fires, floods, earthquakes, hurricanes, tornadoes, and lightning
Blackouts and brownouts- Blackout: total loss of electricity
- Brownout: partial loss of electricity
- Uninterruptible power supply (UPS): backup power for a short time
- Natural disasters
- Major causes of hardware damage
- Vandalism
- Deliberate destruction
- Vandalism
The #1 cause of system downtime
hardware failure
Major causes of hardware damage
- Natural Disasters
- Blackouts & Brownouts
- Vandalism
Blackout
total loss of electricity
brownout
partial loss of electricity
UPS
Uninterruptible power suply
- backup power for a short time
Risks to Data and Applications
- Data should be a primary concern because it is often a unique resource
- Data and applications are susceptible to disruption, damage, and theft
- The culprit in damage to software or data is almost always human
- Keystroke logging (keylogging): software records individual keystrokes
- Social engineering: con artists pretend to be service people, and ask for passwords
- Identity theft: pretending to be another person
- Phishing: bogus messages direct users to a site to “update” personal data
- Spear phishing: personal information sued to attack organizational systems, particularly financial institutions
- Cyber terrorism: terrorist attacks on business organizations’ information systems
- Disrupt network communication
- Implement denial of service attacks
- Destroy/steal corporate/government information
- Some risks to data
- Alteration
- Destruction
- Web defacement
- Deliberate alteration or destruction is often done as a prank, but has a high cost
- Online vandal’s target may be a company’s website
- Hacking: unauthorized access
- Honeytoken: a bogus record in a networked database used to combat hackers
- Honeypot: a server containing a mirrored copy of a database or a bogus database
- Educates security officers about vulnerable points
- Virus: spreads from computer to computer
- Worm: spreads in a network without human intervention
- Antivirus software: protects against viruses
- Trojan horse: a virus disguised as legitimate software
- Logic bomb: software that is programmed to cause damage at a specific time
- Unintentional, non-malicious damage can be caused by:
- Poor training
- Lack of adherence to backup procedures
- Unauthorized downloading and installation of software may cause damage
- Human error
keylogging
software records individual keystrokes
Social engineering
con artists pretend to be service people, and ask for passwords
Identity theft
pretending to be another person
- Phishing: bogus messages direct users to a site to “update” personal data
- Spear phishing: personal information sued to attack organizational systems, particularly financial institutions
Cyber terrorism
- terrorist attacks on business organizations’ information systems
- involves terrorist attacks on business organizations’ information systems with the intent to:
- Disrupt network communication
- Implement denial of service attacks
- Destroy/steal corporate/government information
Hacking
unauthorized access
Honeytoken
a bogus record in a networked database used to combat hackers
Phishing
bogus messages direct users to a site to “update” personal data
Spear phishing
personal information sued to attack organizational systems, particularly financial institutions
Honeypot
a server containing a mirrored copy of a database or a bogus database
- Educates security officers about vulnerable points
Virus
spreads from computer to computer
Worm
spreads in a network without human intervention
Antivirus software
protects against viruses
Trojan horse
a virus disguised as legitimate software
Logic bomb
software that is programmed to cause damage at a specific time
Unintentional, non-malicious damage can be caused by:
- Poor training
- Lack of adherence to backup procedures
- Unauthorized downloading and installation of software may cause damage
- Human error
Risks to Online Operations
- Many hackers try daily to interrupt online businesses
- Some types of attacks
- Unauthorized access
- Data theft
- Defacing of webpages
- Denial of service
- Hijacking computers
DoS
Denial of service (DoS): an attacker launches a large number of information requests
- Slows down legitimate traffic to site
- Distributed denial of service (DDoS): an attacker launches a DoS attack from multiple computers
- Usually launched from hijacked personal computers called “zombies”
- There is no definitive cure for this
- A site can filter illegitimate traffic