Chapter 5: Protecting information resources Flashcards
Risks with I.T
- privacy issues
- computer crimes
How to mitigate risks
- Anti-virus
- E-mail security measures
- Regularly update operating system
Spyware
Software which secretly gathers information about users while they are on the web
Adware
Form of spyware which collects information from the user in order to display advertisements in the Web browser without the user’s permission
Phishing
Sends fraudulent e-mails that seem to come from legitimate sources
Keystroke loggers
keeps track of and records your keystrokes as you type. It takes the information and sends it to a hacker using a command-and-control (C&C) server.
Sniffing
he act of intercepting and monitoring traffic on a network.
Spoofing (faking ones identity)
Attempt to gain access to network by appearing to be an authorized user in order to gain access to sensitive information.
three aspects of security
- Integrity
- Confidentiality
- Availability
Confidentiality
prevent disclosing information to unauthorized users.
Integrity
Accuracy of information resources within organisation
Availability
- Authorised users has access when needed
- Computers and network in working order
- Quick recovery in event of system failure or disaster
How threats can be classified
As either intentional or unintentional
Intentional threats
- Hacker attacks
- Spreading of virus
- Attacks by upset employees
Unintentional threats
- Natural disasters
- Accidental deletion of data
- Structural failures