Chapter 6 Information Systems Security Flashcards

1
Q

What is IS security?

A

Process of preventing unauthorized access to IS or modification of its data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 2 negative characteristics of IS security?

A

1)Expensive
2)Inconvenient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a IS security threath?

A

person or org that seeks to obtain/alter data or other assets illegally, without owner’s permission/knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threaths use systems…

A

vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 scenarios of a safeguard situation?

A

1)Blocked by safeguards
2)Safeguard is ineffective
3)No safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a vulnerability?

A

Weakness in IS that provides opportunity for threats to gain access to assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a safeguard?

A

Measure to block threat from obtaining asset (type of control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data privacy?

A

Proper collection/processing of personnal data of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is GDPR?

A

General data protection regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 2 common threats?

A

1)Human error (internal employees)
2)Computer crime (external attackers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 components that can face losses?

A

1)Data
2)Software
3)Hardware/infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the data losses related to human errors? (2)

A

1)Inadvertent
2)Deliberate (sabotage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the software losse related to human errors

A

Procedure problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the hardware losses related to human errors?

A

Accidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the data losses related to computer crime? (5)

A

1)Impersonation
2)Hacking
3)Injection
4)Man-in-the-middle
5)Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the software losses related to computer crime? (4)

A

1)Denial service
2)Overflow
3)Usurpation
4)Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the hardware losses related to computer crime? (3)

A

1)Theft
2)terrorism
3)ATP loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is social engineering?

A

when employees are manipulated into divulging data or by passing security on behalf of others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 3 impersonation types?

A

1)Pretexting
2)Phishing
3)Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is pretexting?

A

When someone deceives by pretending to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is phishing?

A

When someone deceives by pretending to be someone else by email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WHat is evil twin?

A

user who mistakes evil twin access point for legitimate one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is man-in-the-middle?

A

Attacker intercepts/may alter communication between 2 unsuspecting parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is malware?

A

Decribe variety of software that damages/disables computers (virus, worm, ect)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is hacking?
Breaking into computer, server, network to steal data
26
What is a brute force attack?
trial and error attack for password/PIN
27
What is an injection attack?
When attackers inserts unwanted input into programs
28
What is cross-site scripting (XSS)?
To infect target machines with malware
29
What is a SQL injection?
When attacker enters SQL statement into a form on web page in which client is supposed to enter name/data
30
What is Denial of service (DOS)?
Floods web server with milllions of bogus servce requests that so occupy server that ait cannot service legitimate requests
31
What is usurpation?
Unauthorized control of some part of an IS
32
What is an advanced persistent threat (APT)?
sophisticated, long-running computer hack that is perpetrated by large, well funded org such as gov (cyberespionage)
33
What are the 4 challenges of IS security?
1)Attackers dont follow rules 2)Data designed to be copied/shared ez 3)Security depend on everyone in org 4)Business dont have time to thoroughly test security of new system before they are employed
34
What are the threats unique to mobile devices? (2)
1)user 2)attacker
35
What is the data loss related to the user threats to mobile devices?
Inadvertent data leakage
36
What is the software losses related to the user threats to mobile devices? (3)
1)Inconsistent Android updates 2)Jailbreaking 3)Rooting
37
What is the hardware losses related to the user threats to mobile devices? (2)
1)Accidents 2)Forgetfulness
38
What dare the data losses related to the attacker threats to mobile devices? (4)
1)Location services camera 2)Microphones bluejacking 3)Bluesnafing 4)Spoofed QR code
39
What is the software losses related to the attacker threats to mobile devices?
Vulnerability in apps
40
What is the hardware losses related to the attacker threats to mobile devices?
Theft
41
Which of the losses is the most common in mobile devices?
Data
42
What is bluejacking attack?
Harmless messages are sent to device
43
What is bluesnarfing?
Data on user's device is stolen
44
What is spoofed QR code?
Create their own QR code spoofing the legitimate restaurant QR code, place it in restaurant
45
What is jailbreaking?
or rooting: alteration of manufacturer-designed security limitations on mobile devices by the the device user
46
What is the best control to security threats?
Create a strong and multiple passwords
47
What are the 4 organizational securty fundamentals for an organization ?
1)Security policy 2)Risk management/cost matrix 3)Layered defense 4)Graceful degradation of defenses
48
What are the5 technical safeguards?
1)Identification/authorization 2)Encryption, keys, https 3)Firewalls 4)Malware protection 5)Hardening, VPN, secure design
49
What are the 5 data safeguards?
1)Data rights and responsibilities 2)Passwords 3)Encryption 4)Backup/recovery 5)Physical security
50
What are the 5 human safeguards?
1)Employees 2)Nonemployees 3)Account admin 4)Backup/recovery 5)Security monitoring
51
What does a password do?
It authenticates: verifies credentials of individual seeking access
52
What is a smart card?
Plastic card with mircrochip that is loaded with identifying data
53
What is hash?
Scrambled series of characters generated from string of text to form unique digital fingerprint
54
What is encryption?
Process of transforming clear text into coded, uninteligible text for secure storage/communication
55
What is a key in encryption?
number used to encrypt data
56
What is symmetric encryption?
The same key is used to encode/decode
57
What is asymmetric encryption?
2 keys used: 1 for encode and 1 for decode
58
What is a public/private key?
Special version used on the Internet
59
What are the 5 elements of the essence of https?
1)Your computer obtains public key for website 2)Your computer generates key for symmetric encryption 3)Your computer encrypts symmetric key using web site public key 4)Website decodes your message using its private key. Obtains key for symmetric encryption 5)All communication between gov/website use symmetric key
60
What is a firewall?
Computing device that prevents unauthorized access to parts of a network
61
What are the 7 malware protection?
1)Antivirus/antispyware programs 2)Set up anti-malware programs to scan computer frequently 3)Update malware definitions 4)Open email attachments only from knwon sources 5)Promptly install software updates from legitimare sources 6)Browse only in reputable internet neighborhoods 7)Don't use questionable discussion boards
62
What is hardening?
Process of reducing vulnerabilities of computer by restricting function/actions
63
What is a virtual private network (VPN)?
Uses software/dedicated computer to create private network over the public Internet
64
What are the 5 human safeguards for employees?
1)Position definition 2)Hiring/screening 3)Dissemination and enforcement 4)Termination 5)Enforce mobile device security policy
65
What are the elements of position definition for human safeguards for employees? (4)
1)Separate duties/authorities 2)Determine least privilege 3)Document position sensitivity 4)Security sensitivity
66
What are the 3 eleemts for dissemination and enforcement of human safeguards for employees?
1)Responsibility 2)Accountability 3)Compliance
67
What is the human safeguards for nonemployee personnel?
Opening information to nonemployee/temporary personnel
68
What is account administration tasks? (3)
1)User accounts 2)Passwords 3)Removal of unneeded accounts
69
What is the elements of security monitoring?
Security audit
70
What are the 4 attributed of successful disaster and incident reponse plans?
1)Have a plan in place 2)Centralized reporting 3)Practice response 4)Determine cause
71
what are computer forensics used for?
Determine cause of disaster/incident
72
What are the 3 challenges of IS security?
1)Attackers don't have to follow rules 2)Data is designed to be copied/shared ez 3)New tech are often less secure
73
What are the 3 security challenges expected in 2031?
1)Blockchain 2)AI 3)Severe shortage of cyber security professionals