chapter 4 Flashcards
def. information security
Protecting an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
def. threat
Any danger to which an information resource may be exposed
def. vulnerability
The possibility that an information resource will be harmed by a threat
What are the five key factors contributing to the increasing vulnerability of organizational information sources?
- Today’s interconnected, interdependent, wirelessly networked business environment.
- Smaller, faster, cheaper computers and storage devices.
- Decreasing skills necessary to be a computer hacker.
- International organized crime taking over cybercrime.
- Lack of management support.
def. trusted network
any network within your organization
def. untrusted network
any network external to your organization
wireless is an inherently ____________ broadcast communications medium
nonsecure
def. cybercrime
Illegal activities executed on the Internet
what are the to major categories of threats?
unintentional threats
deliberate threats
what is a major category of unintentional threats?
human error
What are two important points about employees regarding threats?
- the higher the level of employee, the greater the threat he or she poses to information security
- - higher level employees typically have greater access to corporate data, and they enjoy greater privileges on organizational information systems - employees in two areas of the organization pose especially significant threats to information security: human resources and information systems (IS)
- -HR employees have access to sensitive personal information, IS employees not only have access to sensitive organizational data but also often control the means to create, store, transmit, and modify those data
who tends to be overlooked when considering threats
janitors and guards
as well as contract labour and consultants
what are human errors they result of?
typically the result of laziness, carelessness, or a lack of awareness concerning information security. This lack of awareness arises from poor education and training efforts by the organization.
def. social engineering
Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges
-most common example is attacker impersonating someone else on the telephone, or impersonating other individuals
two other social engineering techniques
Tailgating: a technique designed to allow the perpetrator to enter restricted areas that are controlled with locks or card entry. The perpetrator follows closely behind a legitimate employee and, when the employee gains entry, the attacker asks him or her to “hold the door.”
Shoulder surfing: occurs when a perpetrator watches an employee’s computer screen over the employee’s shoulder. This technique is particularly successful in public areas such as in airports and on commuter trains and airplanes
def. espionage or trespass
occurs when an unauthorized individual attempts to gain illegal access to organizational information
-industrial espionage crosses the legal boundary such as theft of confidential data
def. information extortion
occurs when an attacker either threatens to steal or actually steals information from a company. The perpetrator demands payment for not stealing the information, for returning stolen information, or for agreeing not to disclose the information.
def. sabotage or vandalism
deliberate acts that involve defacing an organization’s website, potentially damaging the organization’s image and causing its customers to lose faith in the organization
-ex. hacktivist or cyberactivist operation
describe dumpster diving
involves rummaging through commercial or residential garbage to find discarded information. Paper files, letters, memos, photographs, IDs, passwords, credit cards, and other forms of information can be found in dumpsters
-this info can be used for fraudulent purposes
def. identity theft
Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud
techniques for illegally obtaining personal info
- Stealing mail or dumpster diving.
- Stealing personal information in computer databases.
- Infiltrating organizations that store large amounts of personal information (e.g., data aggregators such as Acxiom)
- Impersonating a trusted organization in an electronic communication (phishing).
def. intellectual property
The intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright laws
def. trade secret
Intellectual work, such as a business plan, that is a company secret and is not based on public information
def. patent
A document that grants the holder exclusive rights on an invention or process for a specified period of time, currently 20 years
def. copyright
A grant that provides the creator of intellectual property with ownership of it for a specified period of time, currently the life of the creator plus 50 years
def. piracy
Copying a software program (other than freeware, demo software, etc.) without making payment to the owner
What are the 3 general categories of cyberattacks?
(1) Remote Attacks Requiring User Action
(2) Remote Attacks Needing No User Action
(3) Attacks by a Programmer Developing a System
def. virus
Segment of computer code that performs malicious actions by attaching to another computer program
def. worm
Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program)
def. phising attack
Attack that uses deception to acquire sensitive personal information by masquerading as official-looking emails or instant messages
def. spear phishing
Attack that targets large groups of people. The perpetrators find out as much information as they can about an individual, tailoring their phishing attacks to improve their chances that they will obtain sensitive, personal information
def. denial-of-service attack
An attack where an attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes (ceases to function)
def. distributed denial-of-service attack
An attack where an attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated stream of information requests to a target computer, causing it to crash
def. bot or zombie
A computer that has been compromised by, and is under the control of, a hacker
def. botnet
A network of computers that has been compromised by, and is under the control of, a hacker, who is called the botmaster
def. trojan horse
Software programs that hide in other computer programs and reveal their designed behaviour only when they are activated
def. back door
Typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures (also called a trap door
def. logic bomb
A segment of computer code that is embedded within an organization’s existing computer programs and is designed to activate and perform a destructive action under specific conditions, such as at a certain time or date
What are the four types of software attacks that are remote attacks requiring user action?
virus, worm, phishing attack, spear phishing
what are the two types of remote attacks needing no user action
denial-of-service attack
distributed denial-of-service attack
What are the three kinds of attacks by a programmer developing a system?
trojan horse, back door, logic bomb
def. alien software
Clandestine software that is installed on your computer through duplicitous methods
def. adware
Alien software designed to help pop-up advertisements appear on your screen
def. spyware
software that collects personal information about users without their consent
what are the two common types of spyare
keystroke loggers (record both your individual keystrokes and your web browsing history) and screen scrapers (his software records a continuous “movie” of a screen’s contents rather than simply recording keystrokes)
def. spamware
Alien software that uses your computer as a launch platform for spammers
def. spam
unsolicited email, usually advertising for products and services
what is an issue with spam
it wastes time and money. Spam costs companies around the world billions of dollars every year. These costs arise from productivity losses, clogged email systems, additional storage, user support, and anti-spam software. Spam can also carry viruses and worms, making it even more dangerous