Cybercrime and CyberSecurity Ch14,15,19 Flashcards

1
Q

What are the challenges of managing cybersecurity?

A

Determining the assets most at risk

Determining the threats and likelihood of a successful attack

Determining the technology solutions for cypersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What questions should you ask when you are planning for security?

A

What needs to be secured?

Who is responsible for it?

What are the technical requirements that should be in place?

How are the people supported?

What do we do if something goes run? How do we respond?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chief Information Security Officer

A

executive who is responsible for information security in a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are security controls that should be in place?

A

IAM: Identity access management

  • password policies
  • credentialing

Network and host defenses:

  • Firewalls
  • IDS
  • IPS
  • anti-virus

VPN and BYOD

Vulnerability patching

User awareness and education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some security policies that should be in place?

A

High level articulation of security objectives and goals

  • legal, business, and regulatory rationale
  • do’s and don’ts for users: password strengths and lengths, web and email policies, response to security threats
  • Address prevention, detection, response and remediation as it impacts users

Ensure that no state and federal laws are violated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do we quantify cybersecurity risk?

A

Risk exposure = Prob(Adverse security event) * Impact of adverse event

Risk Leverage = Risk exposure without certain control - Risk exposure with certain control / cost of control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What goes into assessing / reducing cyber risk?

A

Expected losses from cyber event

Deciding what to accept or transfer (to insurance)

Reduction via preventative measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a reactive security posture?

A

Security measures that react to:

  • regulation and compliance
  • customer demands
  • In response to breach
  • In response to events
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a proactive security posture?

A

Security measures that consist of the following:
- someone employed to handle cybersecurity
- Board-level conversations about cybersecurity
-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the arguments for better cybersecurity?

A
  • reducing costs in the long term

- better reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cybercrime defined as?

A

Computer crime, or cybercrime, is a term used broadly to describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the categorizations of cybercrime?

A

Computers as targets
ie) attacks on data,system,privacy integrity
Computers as storage devices
ie) stolen passwords list
Computers as communication tools i.e) illegal sales online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are three types of intelletual property?

A

Real property - land and things attached to land

Personal property - tangible goods

Intellectual property - any intangible asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name 3 types of Intellectual Property

A

Patents

Trademarks

Copyrights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the reproduction rights a copywrite owner has:

A

Reproduction right: Lets the owner make copies of a work

Modification right: Also known as the derivative-works right; concerns modifying a work to create a new or derivative work

Distribution right: Lets the owner publicly sell, rent, lease, or lend copies of the work

Public-performance right: Applies mainly to live performances

Public-display right: Lets the owner publicly show a copy of the work directly or by means of a film, slide, or television image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three types of patents?

A

Utility patents: May be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof;

Design patents: May be granted to anyone who invents a new, original, and ornamental design for an article of manufacture; and

Plant patents: May be granted to anyone who invents or discovers and asexually reproduces any distinct and new variety of plant.

17
Q

What are exempted from the provisions of the DMCA and other copywriter laws?

A

Fair use: This concept is not tightly defined. It is intended to permit others to perform, show, quote, copy, and otherwise distribute portions of the work for certain purposes. These purposes include review, comment, and discussion of copyrighted works.

Reverse engineering: Reverse engineering of a software product is allowed if the user has the right to use a copy of the program and if the purpose of the reverse engineering is not to duplicate the functionality of the program but rather to achieve interoperability.

Encryption research: “Good faith” encryption research is allowed. In essence, this exemption allows decryption attempts to advance the development of encryption technology.

Security testing: This is the access of a computer or network for the good faith testing, investigating, or correcting a security flaw or vulnerability, with the authorization of the owner or operator.

Personal privacy: It is generally permitted to bypass technological measures if that is the only reasonable way to prevent the access to result in the revealing or recording of personally identifying information.

18
Q

What objectives does the Digital Right Management model meet?

A

DRM systems should meet the following objectives:

Provide persistent content protection against unauthorized access to the digital content, limiting access to only those with the proper authorization.

Support a variety of digital content types (e.g., music files, video streams, digital books, and images).

Support content use on a variety of platforms (e.g., PCs, tablets, iPods, and mobile phones).

Support content distribution on a variety of media, including CD-ROMs, DVDs, and portable USB storage devices.

19
Q

What are some common requirements for privacy based on the Common Criteria specifications?

A

Anonymity: Ensures that a user may use a resource or service without disclosing the user’s identity. Specifically, this means that other users or subjects are unable to determine the identity of a user bound to a subject (e.g., process or user group) or operation. It further means that the system will not solicit the real name of a user. Anonymity need not conflict with authorization and access control functions, which are bound to computer-based user IDs, not to personal user information.

Pseudonymity: Ensures that a user may use a resource or service without disclosing its user identity, but can still be accountable for that use. The system shall provide an alias to prevent other users from determining a user’s identity, but the system shall be able to determine the user’s identity from an assigned alias.

Unlinkability: Ensures that a user may make multiple uses of resources or services without others being able to link these uses together.

Unobservability: Ensures that a user may use a resource or service without others, especially third parties, being able to observe that the resource or service is being used. Unobservability requires users and/or subjects cannot determine whether an operation is being performed. Allocation of information impacting unobservability requires the security function provide specific mechanisms to avoid the concentration of privacy related information within the system. Unobservability without soliciting information requires the security function does not try to obtain privacy-related information that might be used to compromise unobservability. Authorized user observability requires the security function to provide one or more authorized users with a capability to observe the usage of resources and/or services.

20
Q

Guidelines are used to manage the use and reuse of big data. What areas do the guidelines address?

A

Consent: Ensuring participants can make informed decisions about their participation in the research.

Privacy and confidentiality: Privacy is the control that individuals have over who can access their personal information. Confidentiality is the principle that only authorized persons should have access to information.

Ownership and authorship: Addresses who has responsibility for the data, and at what point does an individual give up their right to control their personal data.

Data sharing—assessing the social benefits of research: The social benefits that result from data matching and reuse of data from one source or research project in another.

Governance and custodianship: Oversight and implementation of the management, organization, access, and preservation of digital data.

21
Q

Explain the ethical hierarchy:

A

At the top of the hierarchy are the ethical values professionals share with all human beings, such as integrity, fairness, and justice. Being a professional with special training imposes additional ethical obligations with respect to those affected by his or her work. General principles applicable to all professionals arise at this level. Finally, each profession has associated with it specific ethical values and obligations related to the specific knowledge of those in the profession and the powers that they have to affect others. Most professions embody all of these levels in a professional code of conduct, a subject discussed subsequently.

22
Q

In which ways could computers pose as challenges to ethics?

A

Repositories and processors of information: Unauthorized use of otherwise unused computer services or of information stored in computers raises questions of appropriateness or fairness.

Producers of new forms and types of assets: For example, computer programs are entirely new types of assets, possibly not subject to the same concepts of ownership as other assets.

Instruments of acts: To what degree must computer services and users of computers, data, and programs be responsible for the integrity and appropriateness of computer output?

Symbols of intimidation and deception: The images of computers as thinking machines, absolute truth producers, infallible, subject to blame, and as anthropomorphic replacements of humans who err should be carefully considered.

23
Q

Name some general moral imperatives

A
  1. 1Contribute to society and human well-being.
  2. 2Avoid harm to others.
  3. 3Be honest and trustworthy.
  4. 4Be fair and take action not to discriminate.
  5. 5Honor property rights including copyrights and patent.
  6. 6Give proper credit for intellectual property.
  7. 7Respect the privacy of others.
  8. 8Honor confidentiality.
24
Q

What are topics that should be addressed with organizational security policy?

A

The scope and purpose of the policy

The relationship of the security objectives to the organization’s legal and regulatory obligations, and its business objectives

IT security requirements in terms of confidentiality, integrity, availability, accountability, authenticity, and reliability, particularly with regard to the views of the asset owners

The assignment of responsibilities relating to the management of IT security and the organizational infrastructure

The risk management approach adopted by the organization

How security awareness and training is to be handled

General personnel issues, especially for those in positions of trust

Any legal sanctions that may be imposed on staff, and the conditions under which such penalties apply

Integration of security into systems development and procurement

Definition of the information classification scheme used across the organization

Contingency and business continuity planning

Incident detection and handling processes

How and when this policy should be reviewed

The method for controlling changes to this policy

25
Q

What are the approaches to security risk assessment?

A

baseline approach - implement a basic general level of security controls on systems using baseline documents, codes of practice, and industry best practice.

informal approach - conducting some form of informal, pragmatic risk analysis for the organization’s IT systems. This analysis does not involve the use of a formal, structured process, but rather exploits the knowledge and expertise of the individuals performing this analysis.

Detailed risk analysis - to conduct a detailed risk assessment of the organization’s IT systems, using a formal structured process.

Combined approach - provide reasonable levels of protection as quickly as possible then to examine and adjust the protection controls deployed on key systems over time.

26
Q

What is the risk index formula?

A

Risk Index = Max Info Sensitivity - Min User Clearance

27
Q

What are the steps of detailed risk analysis?

A

Prepare for assessment

Identify threats and sources of threats

Identify vulnerabilities

Determine the likelihood of occurrence

Determine magnitude of impact

Determine risk

28
Q

What are the most vulnerable industries?

A

Government
Finance
Health Care
Transportation

29
Q

What is the risk formula?

A

Risk = Probability that threat occurs X Cost to organization

30
Q

What the levels of risk likelihood?

Levels of Risk consequences?

A
Rare 
Unlikely 
Possible 
Likely 
Almost Certain 
Insigificant 
Minor 
Moderate
Major 
Catastrophic 
Doomsday
31
Q

What are the possible judgements about risk treatments?

A

Risk acceptance - choosing to accept risk for business reasons

Risk avoidance - not proceeding with the activity or system that creates the risk

Risk Transfer - sharing responsibility with a third party

Reduce consequences - By modifying the structure or use of the assets at risk to reduce the impact on the organization should the risk occur

Reduce likelihood - By implementing suitable controls to lower the chance of the vulnerability being exploited.

32
Q

What is a security control?

What are the types of controls?

A

An action, device, procedure, or other measure that reduces risk by eliminating or preventing a security violation, by minimizing the harm it can cause, or by discovering and reporting it to enable corrective action

aka safeguard, countermeasure, procedure

Types:
Management
Operational
Technical

33
Q

What type of controls are included in the types of security controls?

A

Supportive controls: Pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.

Preventative controls: Focus on preventing security breaches from occurring, by inhibiting attempts to violate security policies or exploit a vulnerability.

Detection and recovery controls: Focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.

34
Q

Give examples for each type of control family:

A

management - planning, program management, risk management, Security Assessment, System and Services Acquisition

operational - personnel security, physical protection, incident response, contingency planning, config management, etc.

Technical - access control, audit, identification/authentication, system and communication protection