Chapter 6 Information Systems Security Flashcards
What is IS security?
Process of preventing unauthorized access to IS or modification of its data
What are 2 negative characteristics of IS security?
1)Expensive
2)Inconvenient
What is a IS security threath?
person or org that seeks to obtain/alter data or other assets illegally, without owner’s permission/knowledge
Threaths use systems…
vulnerabilities
What are the 3 scenarios of a safeguard situation?
1)Blocked by safeguards
2)Safeguard is ineffective
3)No safeguard
What is a vulnerability?
Weakness in IS that provides opportunity for threats to gain access to assets
What is a safeguard?
Measure to block threat from obtaining asset (type of control)
What is data privacy?
Proper collection/processing of personnal data of individuals
What is GDPR?
General data protection regulation
What are the 2 common threats?
1)Human error (internal employees)
2)Computer crime (external attackers)
What are the 3 components that can face losses?
1)Data
2)Software
3)Hardware/infrastructure
What are the data losses related to human errors? (2)
1)Inadvertent
2)Deliberate (sabotage)
What are the software losse related to human errors
Procedure problems
What are the hardware losses related to human errors?
Accidents
What are the data losses related to computer crime? (5)
1)Impersonation
2)Hacking
3)Injection
4)Man-in-the-middle
5)Malware
What are the software losses related to computer crime? (4)
1)Denial service
2)Overflow
3)Usurpation
4)Malware
What are the hardware losses related to computer crime? (3)
1)Theft
2)terrorism
3)ATP loss
What is social engineering?
when employees are manipulated into divulging data or by passing security on behalf of others
What are the 3 impersonation types?
1)Pretexting
2)Phishing
3)Evil twin
What is pretexting?
When someone deceives by pretending to be someone else
What is phishing?
When someone deceives by pretending to be someone else by email
WHat is evil twin?
user who mistakes evil twin access point for legitimate one
What is man-in-the-middle?
Attacker intercepts/may alter communication between 2 unsuspecting parties
What is malware?
Decribe variety of software that damages/disables computers (virus, worm, ect)