Chapter 2 - The Need for Security Flashcards

1
Q

What are the 4 learning objectives?

A
  1. Discuss the organizational business need for information security
  2. Explain why a successful information security program is the shared responsibility of an organization’s general management and IT management
  3. List and describe the threats posed to information security and common attacks associated with those threats
  4. Describe the relationship between threats and attacks against information within systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

information assets

A

information and the systems that house them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 important functions that IS performs for an organization?

A
  1. Protect the org’s ability to function
  2. Protect the data and info the organization collects and uses
  3. Enabling the safe operation of applications running on the organizations’ IT systems
  4. Safeguarding the organization’s tech assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of mgmt (general and IT) with respect to IS?

A

They are responsible for implementing and facilitating a security program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How should information security be addressed?

A

In terms of business impact (outages, loss of client trust, etc.) and cost of business interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three stages through which data must be protected?

A

data in transmission (input), in processing (transfer), and at rest (storage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

threats

A

a potential risk to an asset’s loss of value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the most common types of attack/misuse as of CSI’s 2011 Survey?

A
  1. Malware infection
  2. Being fraudulently represented as the sender of a phishing message
  3. Laptop/mobile theft or loss
  4. Bot/Zombies in the organization
  5. Insider abuse of internet or email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

12 categories of threat

A
  1. Compromises to IP
  2. Deviation in quality of service
  3. Espionage/trespass
  4. Forces of nature
  5. Human error or failure
  6. Information extortion
  7. Sabotage or Vandalism
  8. Software attacks
  9. Hardware failures/errors
  10. Software failures/errors
  11. Technological obsolescence
  12. Theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intellectual Property (IP) & most common type of breach?

A

creation, ownership and control of original ideas as well as the representation of those ideas

software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What factors can affect quality of service if compromised?

A

Information systems depend on the operation of many interdependent systems: internet service, communications, suppliers, vendors, janitorial staff, garbage haulers, power irregularities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Forms of espionage/trespass

A
  1. industrial espionage
  2. shoulder surfing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Expert vs. unskilled hacker

A

Expert hackers: develop software scripts and program exploits, usually a master of many skills, often creates an attack software and shares it with others.

Unskilled hackers - use the expertly written software to exploit a system, do not usually fully understand the systems they hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hacker - Cracker

A

“cracks” or removes the software protection that’s there to prevent unauthorized duplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phreaker

A

hacks the public telephone system to make free calls or disrupt services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering

A

using social skills to convince people to reveal access credentials or other valuable information to an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Advance-fee fraud

A

indicates the recipient is due money and small advance fee/personal banking information is required to facilitate the transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Phishing

A

attempting to gain personal/confidential info, apparent legitimate communication hides an embedded code that redirects the target to a third party site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Timing attack

A

Timing Attack - Relatively new, works by exploring the contents of a Web browser’s cache. This could allow the designer to collect information to access to password-protected sites. Another attack by the same name involves attempting to intercept cryptographic elements to determine keys and encryption algorithms.

20
Q

Malware

A

Malware - malicious software used to overwhelm the processing capabilities of online systems or to gain access to protected systems via hidden means

21
Q

Types of Software attacks

A

–Viruses

–Worms

–Trojan horses

–Polymorphic threats

–Virus and worm hoaxes

–Back door or trap door

–Denial-of-service and distributed denial-of-service

–Mail bomb

22
Q

Virus

A

code segments that attach to an existing program and take control of the targeted computer

23
Q

Worms

A

replicate themselves until they completely fill available resources such as memory and hard-drive space

24
Q

Trojan horses

A

malware disguised as helpful, interesting, or necessary pieces of software

25
Q

Password attacks

A

Password Crack - Attempting to reverse calculate a password.

Brute Force - The application of computing and network resources to try every possible combination of options of a password.

Dictionary - The dictionary password attack narrows the field by selecting specific accounts to attack and uses a list of commonly used passwords (the dictionary) to guess with.

26
Q

Denial of Service and Distributed Denial of Service

(DoS & DDoS)

A

Denial-of-Service (DoS) - The attacker sends a large number of connection or information requests to a target. So many requests are made that the target system cannot handle them successfully along with other, legitimate requests for service. This may result in a system crash or merely an inability to perform ordinary functions.

Distributed Denial-of-Service (DDoS) - An attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

27
Q

Spoofing and Man in the Middle

A

Spoofing - A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

Man-in-the-Middle - In the man-in-the-middle or TCP hijacking attack, an attacker sniffs packets from the network, modifies them, and inserts them back into the network

28
Q

Packet sniffer

A

–Packet sniffer: It monitors data traveling over network; it can be used both for legitimate management purposes and for stealing information from a network.

29
Q

Pharming

A

Redirection of legitimate browser requests to illegitimate sites for the purpose of obtaining private information

30
Q

Deadly sins of software security

A

•Common failures in software development:

–Buffer overruns

–Command injection

–Cross-site scripting (XSS)

–Failure to handle errors

–Failure to protect network traffic

–Failure to store and protect data securely

–Failure to use cryptographically strong random numbers

–Format string problems

–Neglecting change control

–Improper file access

–Improper use of SSL

–Information leakage

–Integer bugs (overflows/underflows)‏

–Race conditions

SQL injection

31
Q

Technological Obsolescence

A

When the infrastructure becomes antiquated or outdated, it leads to unreliable and untrustworthy systems.

32
Q

Theft

A

Illegal taking of another’s physical, electronic, or IP

33
Q

Software assurance (SA) & CBK

A
  • A national effort is underway to create a common body of knowledge focused on secure software development.
  • U.S. Department of Defense and Department of Homeland Security supported the Software Assurance Initiative, which resulted in the publication of Secure Software Assurance (SwA) Common Body of Knowledge (CBK)‏.
34
Q

Good software design principles

A

–Keep design simple and small

–Access decisions by permission not exclusion

–Every access to every object checked for authority

–Design depends on possession of keys/passwords

–Protection mechanisms require two keys to unlock

Programs/users utilize only necessary privileges

–Minimize mechanisms common to multiple users

–Human interface must be easy to use so users routinely/automatically use protection mechanisms.

35
Q

PKI

A

Public key infrastructure

36
Q

SOHO

A

small office and home office device

37
Q

attack

A
38
Q

threat agent

A

person/entity that may cause loss of an asset’s value

39
Q

vulnerability

A

a potential weakness

40
Q

12 Categories of Threats

A

Categories of threat and their attack examples

41
Q

What is the difference between a virus and a worm?

A
42
Q

Pharming

A

Pharming is a cyberattack intended to redirect a website’s traffic to another, fake site.

43
Q

Spoofing

A

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

44
Q

Packet sniffer

A

A packet analyzer or packet sniffer is a computer program or computer hardware such as a packet capture appliance, that can intercept and log traffic that passes over a computer network or part of a network. Packet capture is the process of intercepting and logging traffic

45
Q

OWASP

A

Open Web Application Security Project - helps orgos build and operate software applications they can trust

46
Q

polymorphism

A

Polymorphic malware is a type of malware that constantly changes its identifiable features in order to evade detection.

47
Q
A