Chapter 8: Securing Information Systems Flashcards
system vulnerability & abuse, business value of security & control, org. frameworks, tools & tech
1
Q
Why is is the Internet vulnerable?
A
Because it is an open system that contains digital data, which is vulnerable to destruction, misuse, error, fraud & hardware/ software failings
2
Q
Name potential harmful actions against IS
A
- Spoofing: Hiding one’s identy or faking identity of another user
- Sniffing: monitors information travelling over a (WiFi) network
- Denial-of-service attacks (DoS) & distributed-Dos (DDoS): crashing network by flooding server with false requests
- Botnet: group of Internet-connected devices with bots(spam attacks, DDoS etc.)
- Identity theft
- Evil twins: wireless networks pretending to offer secure WiFi
- Pharming: automatically leading to incorrect webpage
3
Q
Why is countering harmful actions difficult?
A
- dispersed nature of cloud computung hinders tracking
- software often contains bugs & vulnerabilities that can be exploited by hackers
- end users often introduce errors by mistake
4
Q
What is the business value of security & control?
A
- ensuring sales & productivity are not negatively impacted
- some information uses value if leaked to outsiders or exposing firm to legal liability
- several laws (HIPAA etc.) require firms to practice electronic records management & maintain high data security standards
- electronic evidence & computer forensics
5
Q
What does the control framework for IS consist of?
A
- general control: overall control environment governing design, security & use of computer programs & data file security throughout firm’s IT infrastructure
- application control: specific controls unique to each computerized application, ensuring only authorized data are processed (Input/Process/Output-Control)
6
Q
What does risk assessment mean?
A
- evaluating information assets
- identifying control points & weaknesses
- determining most effective set of controls
7
Q
What does security policy mean?
A
- policies for acceptable use & identity management(validation & control over users)
- ranknig informtion risks
- identifying security goals
- mechanisms for achieving these goals
–> Systematic IS auditing to determine security effectiveness
8
Q
Tools for safeguarding information resources
A
- firewalls: combination of hard- & software preventing unauthorized users from accessing private networks
- intrusion detection systems: monitoring private networks for suspicious network traffic
- authentication through passwords, tokens, smart cards, biometric athentication or two-factor processes
- anti-malware software
9
Q
Name the different types of malware
A
- viruses: rogue software attaching itself to other programs
- worms: independent programs copying themselves over to other computers/ networks
- trojan horses: software does other as expected
- SQL injection hacks: hackers submit data to web forms that exploit site’s unprotected software & send rogue SQL query to database
- ransomware: encrypting files & demanding ransom for decryption
- spyware: gathering info without someone’s knowledge
10
Q
Technologies for safeguarding information resources
A
- encryption
- blockchain tech: create & verify transactions on a decentralized network
- digital certificates combined with public key encryption (based on public key infrastructure (PKI) & private key)
- fault-tolerant computer systems: able to still operate although parts of system fail
- use of software metrics & testing