Chapter 8: Securing Information Systems Flashcards
Cybersecurity
art of protecting networks, devices, and data from unauthorized access , ensuring CIA
CIA Triad
Confidentiality, Integrity, Availability
Confidentiality
- controlled access, data kept secret and private
Integrity
- data is trustworthy and free from tampering
- accurate
Availability
systems must be functioning, data must be accessible
Security
Policies, procedures, and technical measures used to prevent unauthorized access or damage to IS
Controls
methods, policies, and organizational procedures that ensure the safety or org’s assets, the accuracy and reliability of records, and operational adherence to management standards
Vulnerability
weakness or flow in system that can be exploited
- weakest link (poor sys mgmt)
- hardware
- software
- loss or theft
- networks outside control
Internet Vulnerabilities
- large networks open to anyone = recipe for widespread impact
- emails could have malicious software
- IM could be backdoor
- sharing info over P2P network can compromise
Wireless Security Challenges
- bluetooth, wifi, local area networks (LAN)
- radio frequency bands easy to scan
- SSID
SSID
Service Set Identifiers
- identify access points
- broadcast multiple times
- found by sniffer programs
- War Driving
War Driving
eavesdroppers drive by and try to detect SSIDs to get on network
Software Vulnerability
- bugs (program code defects)
- zero defects can’t be achieved
- 0 day vulnerabilities
- patchwork
Malicious Software
- malware
- virus
- worms
- SQL Injection
- Trojan Horse
- RansomWare
- Spyware
Malware
malicious software
virus
rogue software program that attaches itself to other stuff to be executed
- must deliver payload
- spread from computer to computer
Worms
independent programs that copy themselves from one computer to another
Trojan Horse
- appear benign, but does something different than expected
- way viruses/malware is introduced
SQL Injection
install themselves under the radar to monitor web activity and sense advertising
- Keyloggers
Keyloggers
record keystrokes on computers to steal serial numbers for software
Red Team
- vulnerability and penetration testing
- treat hunting
- malware analysis
- social engineering
Purple Team
red and blue teams working together to improve cybersecurity
Blue
- incident responders
- security operations
- IT networks and systems
Denial-of-Service
- flooding server with thousands of requests
Distributed DOS
multiple computers to launch
- Botnet: network of “zombie” PCs infilitrated by bot malware
Computer Crime
violation criminal law that involve knowledge of computer tech for their perpetration, investment, and prosecution
- computer can be either the target or instrument
Phishing
setting up fake websites or sending emails that look legit and asking for personal data
Spear-Phishing
sends fraud email to organizations’ employees