Chapter 5 Flashcards
What is information security and why do companies protect information resources?
a. Processes/policies made to protect an org data info system from unauthorized use
b. Companies protect because security breaches are expensive
CIA frame work
Confidentially
i. System must prevent disclosing info to anyone not authorized to access it
Integrity
i. Accuracy of info resources within org
Availability
i. Computers and networks are working and the right people can get the info they need
ii. Should recover quick if system fails
Spyware Vs Adware
Spyware
i. software that secretly gathers info about users
adware
i. form of spyware that collects info to display ads
Keystroke loggers
a. Monitors and records keystrokes
b. On hardware or software
Sniffing Vs Spoofing
Sniffing
a. Capturing and recording network traffic
Spoofing
a. attempt to gain access to network by posing as an authorized person to find
Virus, Worms, and Trojan program
Virus
i. Attaches itself and is triggered by time or event(click)
Worms
i. Independent programs that spread themselves without having to be attached to a host program
Trojan programs
i. Hides in a popular program and contains code to disrupt computer
Logic bomb
a. type of trojan program used to release a virus worm or other code
b. triggered by an event
Backdoor
a. Built by designers that allows them to sneak into system later to access files
RAM scraping
a. Scans ram to find sensitive data like credit card
Social engineering
a. Using people skills to trick others into revealing private info
b. Ex: using kids name aa password
Denial of Service attacks:
a. Floods server with requests to prevent user from accessing system
b. DDOS
Fault-tolerant systems
a. Using hardware and software to ensure availability in event of system failure o Commonly used methods i. Mirror disks ii. RAID iii. UPS
Access control
and the 3 types
a. Designed to protect systems from unauthorizes access
- Biometric
- Ex: facial recognition - Non-biometric
- Password
3.Physical
Firewalls
and the 3 types
a. Combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks
- Application firewall
- controls use of applications such as email - Packet-filtering firewall
- examines every packet passing into and out of a network - Proxy server
- acts as an intermediary between two systems