Chapter 5: Security Flashcards
4 Costs of Cyber crime
- Stolen identities, intellectual property, trade secrets
- Damaged reputations
- Cost of upgrading security after an attack
- Opportunity costs associated with downtime, lost trust, loss of sensitive business information
Spyware
- Software that secretly gathers information about users while they browse the web
- Install antivirus or anti spyware software
Adware
- Type of spyware that collects information about the user to determine which advertisements to display in the user’s Web browser
- Install ad-blocking feature
Phishing
- Sending fraudulent e-mails that seem to come from legitimate sources that direct recipients to false Web sites to capture private information
- Provides http address and attaches file
- User types in password
Pharming
- Hijacking and altering the Internet Patrol (IP) address of an official Web site
- Users who enter the correct Web address are directed to the pharmer’s fraudulent Web site
- Similar to phishing, it directs internet users to fraudulent web sites with the intention of stealing their personal information, such as social security numbers, passwords, bank account numbers, and credit card numbers.
Baiting
Similar to phishing (sending emails to fake websites) but the the baiter promises something to the recipient
Quid pro quo
- Hacker requests the exchange of critical data or login information in exchange for a service or prize
- Requests exchange of data or login information for service or prize
Keystroke Loggers
- Know everything that you are typing by reading key strokes
- Monitor and record keystrokes
- Can be software or hardware
- Prevented by antivirus and anti spyware programs
Sniffing
Intercepts information by recording and capturing network traffic
Spoofing
Poses as an authorized user to find information
Computer fraud
Unauthorized use of computer data for personal gain
CIA Triangle
- Confidentiality: Disclosing information from unauthorized users
- Integrity: Accuracy of information
- Availability: Authorized users can access information
Virus
- Attaches itself to other programs or files, cycle continues
- Not independent
- Triggered by specific time or event
Worm
- Take up space and makes computer unable to work properly
- Does not usually erase data
- Independent programs that spread themselves without having to be attacked to a host program
- Multiple, replicates, takes computer resources (space)
Logic bombs
- Sits in system and waits to be activated
- Type of trojan program
- Releases virus, worm, or other destructive code
- If-then statement
Trojan program
- Contain code intended to disrupt a computer, network, or Web site
- Hidden inside a popular program
Denial of service (DoS)
Flooding a network or server with service requests to prevent user from accessing the system
Mirror disks
Back up disk
Uninteruptable power supply (UPS)
Back up battery like generator
Fraud tolerant systems
Ensures availability in the event of a system failure by using a combination of hardware and software
Backdoor (trapdoor)
Allows the designer to bypass system security and sneak into the system later to access programs or files
Blended threat
Security threat that combines the characteristics of computer viruses, worms, and other malicious codes found on public and private networks.
Botnet
Type of internal threat (Denial of service DoS) attack that includes a network of computer and loT (internet of things: interrelated computing devices) devices infected with malicious software
Telephony denial of service (TDoS) attacks
Use high volumes of automated calls to tie up a target phone system, halting incoming and outgoing calls
Intentional Threats: Social Engineering
Using “people skills” to trick others into revealing private information
Biometric Security Measures
- Use a physiological element unique to a person that cannot be stolen, lost, copied, or passed on to others
- Ex: Facial recognition, fingerprints, hand, eye, palm, signature, vein and voice recognition
Nonbiometric Security Measures (3 of them)
1) Callback modems: Logs user off after and calls them back later to try again
2) Firewall: Wall/barrier that protects private network
3) Intrusion detection system: In front of a firewall, identifies attacks and alarms network administrator
Nonbiometric Security Measure: Callback Modems
Verifies whether a user’s access is valid by logging the user off and then calling the user back at a predetermined number
Nonbiometric Security Measure: Firewall
- Firewall acts as a filter between a private network and external networks
- Network administrator defines rules for access, and all other data transmissions are blocked
- Wall/barrier that protects private network against external access
- Protects data that goes in and out of network
- Types: Packet-filtering firewalls, application-filtering firewalls, and proxy servers (software that acts as an intermediary between 2 systems such as the user and the internet)
- Private network -> outgoing data -> firewall -> internet
- Internet -> incoming data -> firewall -> private network
Nonbiometric Security Measure: Intrusion Detection System (IDS)
- Protects against external and internal access
- Placed in front of a firewall
- Can identify attack signatures, trace patterns, and alarms the network administrator
- Causes routers to terminate connections with suspicious sources
- Prevents DoS attacks
Physical Security Measures
- Control access to computers and networks and include devices for securing computers and peripherals from theft
- Ex: Cable shielding, room ceiling, corner bolts and steel encasements, electronic trackers, ID badges, proximity release door openers
Access Controls
- Designed to protect systems from unauthorized access in order to preserve data integrity
- 2 Types:
1) Terminal resource security: Erases the screen and signs the user off automatically after a specified length of inactivity
2) Passwords: Combination of numbers, characters, and symbols that is entered to allow access to a system
Virtual Private Network (VPN)
- Provides a secure “tunnel” through the Internet for transmitting messages and data via a private network
- Used so that remote users have a secure connection to the organization’s network
- Used to provide security for extranets (blend of internet, public network and intranet, private network)
- Data is encrypted (coded) before sent through tunnel
E-Commerce Transaction Security Measures
Concerned with the issues such as:
1) Confidentiality
2) Authentication
3) Integrity
4) Nonrepudiation of origin
5) Nonrepudiation of receipt
Computer Emergency Response Team (CERT)
- Focuses on security breaches and DoS attacks
- Offers guidelines on handling or preventing attacks
Business Continuity Planning
- Outlines procedures for keeping a firm operational in the event of a natural disaster or network attack
- Disaster recovery plan: Lists the tasks that must be performed to restore damaged data and equipment and steps to prepare for disaster