Chapter 4 Flashcards
What factors contribute to increasing vulnerability of organizational information resources?
- Interconnected wireless networks
- Cheaper, faster storage devices
- Skills necessary to be a hacker decreasing in skills
- International organized crime taking over cybercrime (cybercrime becoming international organized crime???)
- lack of management support
threat
any danger to which a system may be exposed
security
the degree of protection against criminal activity and danger/ loss.
information security
all of the processes and policies designed to protect an organizations information and information systems from unauthorized access.
exposure
damage that can result if a threat compromises that resource.
vulnerability
the possibility that the system will be harmed by a threat
What are some of the unintentional threats to information systems?
1) Human error,
2) social engineering (pretending to be someone else to obtain a password).
social engineering
attach in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company info (such as passwords).
Espionage/trespass
unauthorized individual attempts to gain illegal access to organizational information.
Information extortion
threatening to steal or actually stealing information from a company, the perpetrator usually demands payment to either not steal the info, to return the info, or to not disclose the information.
Sabotage/vandalism
defacing an organizations website and ruining their reputation.
theft of equipment or information
stealing mobile devices, laptops, tablets, etc.
identity theft
assumption of another persons identity usually to gain access to the financial info.
compromises to intellectual property
infringing on the rights of an individual or organization to a specific property ie patent, trade mark, trade secret.
software attacks
malicious software to infect other computers. Virus, worms, phishing, Trojan horse, back door, logic bomb….
alien software
clandestine software (pestware) that run on computers. Adware, spyware, spamware, cookies.
supervisory control and data acquisition (SCADA) attacks
worms that target to interfere with the computers that are used for operations in chemical control and transportation processes. Ie oil refineries, water and sewage treatment plants, etc.
What are some of the deliberate threats to information systems?
- Espionage/trespass
- Information extortion
- Sabotage/vandalism
- theft of equipment or information
- identity theft
- compromises to intellectual property
- software attacks
- alien software
- supervisory control and data acquisition (SCADA) attacks
- cyberterrorism/cyberwarfare
intellectual property
property created by individuals or corporations. protected under trade secret, patent, and copyright laws.
trade secret
an intellectual work not based on public information
patent
official document that grants the holder exclusive rights for an invention for a specified period of time.
copyright
statutory grant that provides the creators or owners with ownership.
piracy
copying a software or program without making payment to the owner
alien software
clandestine software that is installed on your computer through duplicitous methods.
adware
software that causes pop ups. a vast majority of pastware