Chapter 2 - The Need for Security Flashcards
What are the 4 learning objectives?
- Discuss the organizational business need for information security
- Explain why a successful information security program is the shared responsibility of an organization’s general management and IT management
- List and describe the threats posed to information security and common attacks associated with those threats
- Describe the relationship between threats and attacks against information within systems
information assets
information and the systems that house them
What are the 4 important functions that IS performs for an organization?
- Protect the org’s ability to function
- Protect the data and info the organization collects and uses
- Enabling the safe operation of applications running on the organizations’ IT systems
- Safeguarding the organization’s tech assets
What is the role of mgmt (general and IT) with respect to IS?
They are responsible for implementing and facilitating a security program
How should information security be addressed?
In terms of business impact (outages, loss of client trust, etc.) and cost of business interruption
What are the three stages through which data must be protected?
data in transmission (input), in processing (transfer), and at rest (storage)
threats
a potential risk to an asset’s loss of value
What are the most common types of attack/misuse as of CSI’s 2011 Survey?
- Malware infection
- Being fraudulently represented as the sender of a phishing message
- Laptop/mobile theft or loss
- Bot/Zombies in the organization
- Insider abuse of internet or email
12 categories of threat
- Compromises to IP
- Deviation in quality of service
- Espionage/trespass
- Forces of nature
- Human error or failure
- Information extortion
- Sabotage or Vandalism
- Software attacks
- Hardware failures/errors
- Software failures/errors
- Technological obsolescence
- Theft
Intellectual Property (IP) & most common type of breach?
creation, ownership and control of original ideas as well as the representation of those ideas
software piracy
What factors can affect quality of service if compromised?
Information systems depend on the operation of many interdependent systems: internet service, communications, suppliers, vendors, janitorial staff, garbage haulers, power irregularities
Forms of espionage/trespass
- industrial espionage
- shoulder surfing
Expert vs. unskilled hacker
Expert hackers: develop software scripts and program exploits, usually a master of many skills, often creates an attack software and shares it with others.
Unskilled hackers - use the expertly written software to exploit a system, do not usually fully understand the systems they hack
Hacker - Cracker
“cracks” or removes the software protection that’s there to prevent unauthorized duplication
Phreaker
hacks the public telephone system to make free calls or disrupt services
Social engineering
using social skills to convince people to reveal access credentials or other valuable information to an attacker
Advance-fee fraud
indicates the recipient is due money and small advance fee/personal banking information is required to facilitate the transfer.
Phishing
attempting to gain personal/confidential info, apparent legitimate communication hides an embedded code that redirects the target to a third party site