Chapter 4 Flashcards

1
Q

What factors contribute to increasing vulnerability of organizational information resources?

A
  1. Interconnected wireless networks
  2. Cheaper, faster storage devices
  3. Skills necessary to be a hacker decreasing in skills
  4. International organized crime taking over cybercrime (cybercrime becoming international organized crime???)
  5. lack of management support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

threat

A

any danger to which a system may be exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security

A

the degree of protection against criminal activity and danger/ loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

information security

A

all of the processes and policies designed to protect an organizations information and information systems from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

exposure

A

damage that can result if a threat compromises that resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

vulnerability

A

the possibility that the system will be harmed by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the unintentional threats to information systems?

A

1) Human error,

2) social engineering (pretending to be someone else to obtain a password).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

social engineering

A

attach in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company info (such as passwords).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Espionage/trespass

A

unauthorized individual attempts to gain illegal access to organizational information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information extortion

A

threatening to steal or actually stealing information from a company, the perpetrator usually demands payment to either not steal the info, to return the info, or to not disclose the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sabotage/vandalism

A

defacing an organizations website and ruining their reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

theft of equipment or information

A

stealing mobile devices, laptops, tablets, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

identity theft

A

assumption of another persons identity usually to gain access to the financial info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

compromises to intellectual property

A

infringing on the rights of an individual or organization to a specific property ie patent, trade mark, trade secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

software attacks

A

malicious software to infect other computers. Virus, worms, phishing, Trojan horse, back door, logic bomb….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

alien software

A

clandestine software (pestware) that run on computers. Adware, spyware, spamware, cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

supervisory control and data acquisition (SCADA) attacks

A

worms that target to interfere with the computers that are used for operations in chemical control and transportation processes. Ie oil refineries, water and sewage treatment plants, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some of the deliberate threats to information systems?

A
  • Espionage/trespass
  • Information extortion
  • Sabotage/vandalism
  • theft of equipment or information
  • identity theft
  • compromises to intellectual property
  • software attacks
  • alien software
  • supervisory control and data acquisition (SCADA) attacks
  • cyberterrorism/cyberwarfare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

intellectual property

A

property created by individuals or corporations. protected under trade secret, patent, and copyright laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

trade secret

A

an intellectual work not based on public information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

patent

A

official document that grants the holder exclusive rights for an invention for a specified period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

copyright

A

statutory grant that provides the creators or owners with ownership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

piracy

A

copying a software or program without making payment to the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

alien software

A

clandestine software that is installed on your computer through duplicitous methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

adware

A

software that causes pop ups. a vast majority of pastware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

spyware

A

software the collects personal information about users without their consent. keystroke loggers and screen scrapers.

27
Q

spamware

A

pestware the uses your computer as a launch pad for spammers

28
Q

spam

A

unsolicited email

29
Q

cookies

A

small amounts of information that websites store on your computer (usually temporary)

30
Q

cyberterrorism/ cyberwarfare

A

malicious acts in which attackers use a targets computer systems to cause physical, real world harm usually to carry out a political agenda.

31
Q

risk

A

probability that a threat will impact an information resource.

32
Q

risk management

A

identify, control, and minimize the impact of threats.

33
Q

risk analysis

A

ensures IS programs are cost effective. 1) ass the value of each asset 2) estimate the probability that each asset may be compormised 3)compoaring the probable costs of the assets being compromised with the costs of proteting that asset 4) mitigates risks

34
Q

risk mitigation

A

concrete actions against risks. 1) implementing controls to prevent identified threats from occurring 2) develpoing a means of recovery

35
Q

risk mitigation strategies

A

1) risk acceptance
2) risk limitation
3) risk transference

36
Q

risk acceptance

A

accept the potential risk, continue operating with no controls, and absorb any damages that occur.

37
Q

risk limitation

A

limit the risk by implementing controls that minimize the impact of the threat.

38
Q

risk transference

A

transfer the risk by using other means to compensate for the loss (ie purchasing insurance).

39
Q

What can organizations do to protect information resources?

A

risk mitigation

40
Q

risk controls

A
  • physical controls
  • access controls
  • communication (network) controls
  • Business continuity planning (disaster recovery plan)
  • Information systems auditing
41
Q

physical controls

A

prevent unauthorized individuals form gaining access to a company’s facilities.

42
Q

access controls

A

restricts unauthorized individuals from using information resources. Implements authentication and authorization.

43
Q

authentication

A

confirms the identity of a person requiring access

44
Q

authorization

A

determines which actions a person has based on their verified identity.

45
Q

biometrics

A

authenticates based on something the user is ie physical characteristics. (finger print, retina scan, etc)

46
Q

passwords

A

authentication through something a user knows

47
Q

privilege

A

collection of related computer system operations that a user is authorized to perform.

48
Q

least privilege

A

users be granted the privilege for an activity only if there is a justifiable need for them to perform that activity.

49
Q

communication controls aka…

A

network controls

50
Q

firewall

A

prevents a specific type of information from moving between untrusted networks. such as the internet, private networks, and business networks.

51
Q

demilitarized zone

A

located between the two firewalls.

52
Q

whitelisting

A

a company identifies the software that it will allow to run on its computers.

53
Q

blacklisting

A

a company identifies softwares that it will not allow its computers to run

54
Q

encryption

A

process of converting an original message into a format that cannot be read by anyone except the intended receiver.

55
Q

public key encryption

A

uses public key and private key. both created simultaneously.

56
Q

certificate authority

A

acts as a trusted intermediary between companies.

57
Q

digital certificate

A

electronic document attached to a file that certifies the file is from the organization it claims to be and has not been modified from its orginial format.

58
Q

Virtual Private Network (VPN)

A

private network that uses a public network (ie internet) to connect to users

59
Q

tunneling

A

process used in Virtual Private Networks (VPN’s). Encrypts data packets to be sent. places each encrypted packet inside another encrypted packet.

60
Q

secure socket layer

A

encryption standard used for secure transactions such as credit card purchases or online banking.

61
Q

hot site

A

fully configured computer facility. Has all services, comm links, and physical plant operations.

62
Q

warm site

A

proves many services that hot sites do, but does include all the applications the company needs.

63
Q

cold site

A

provides only rudiementary services and facilities. such as a building or a room with a/c. has no computer hardware or user workstations.