Chapter 4 (Security) Flashcards

1
Q

Types of threats?

A
  1. Intentional
  2. Unintentional
  3. Outside
  4. Inside
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to protect from threats?

A
  1. Risk Management

2. Information security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat?
Vulnerability?
Exposure?
Information Security?

A

Any danger the system’s exposed to
Possibility of system harmed by threat
Harm that can be done by threat
The policies and procedures to protect organization information from destruction or unauthorized use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Outside threats?

A

Natural disasters (floods, storms)
Man-made disasters (fire, power outages)
Internet (malware, hackers, unauthorized users)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Inside threats?

A

Employees (data error, laziness, carelessness)
System software (info leaked, unauthorized software)
Consultants & janitors ( theft, copying)
Hardware ( physical theft, located in non-secure envo.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Factors that increase the vulnerability

A
Modern interconnected environment
Smaller and faster storage devices
It's easy to become a hacker
Organized crime is taking over cyber crime
Lack of support from management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unintentional?

A
Human error
Social engineering (tailgating, shoulder surfing)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intentional?

A
ID theft 
Vandalism
Trespass
Information extortion
Software attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Software attacks?

A

Virus (segment of com. code that performs malicious action by attachment)

Worm (,, ,, ,, no attachement)

Trojan horse (hides in com. program to reveal the behavior when its activated)

Phishing attacks (deception to have sensitive info)

Distributed denial of service ddos (sends so many requests that computer can’t handle)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Management

A

Identify, control, and minimize threats
, risk analysis
, risk mitigation (acceptance, limitation, transference)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to conduct information security control?

A

. Physical control (gates and guards)
. Acess control (authentication, authorization)
. Communication control (firewall, antivirus, encryption, VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business continuity plan (disaster recovery plan)

A

provide guide for employees and how to operate after disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Audits?

A

External

Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IS auditing procedures

A

Auditing——– computer
with
around
through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly