Cybercrime and CyberSecurity Ch14,15,19 Flashcards
What are the challenges of managing cybersecurity?
Determining the assets most at risk
Determining the threats and likelihood of a successful attack
Determining the technology solutions for cypersecurity
What questions should you ask when you are planning for security?
What needs to be secured?
Who is responsible for it?
What are the technical requirements that should be in place?
How are the people supported?
What do we do if something goes run? How do we respond?
Chief Information Security Officer
executive who is responsible for information security in a company
What are security controls that should be in place?
IAM: Identity access management
- password policies
- credentialing
Network and host defenses:
- Firewalls
- IDS
- IPS
- anti-virus
VPN and BYOD
Vulnerability patching
User awareness and education
What are some security policies that should be in place?
High level articulation of security objectives and goals
- legal, business, and regulatory rationale
- do’s and don’ts for users: password strengths and lengths, web and email policies, response to security threats
- Address prevention, detection, response and remediation as it impacts users
Ensure that no state and federal laws are violated
How do we quantify cybersecurity risk?
Risk exposure = Prob(Adverse security event) * Impact of adverse event
Risk Leverage = Risk exposure without certain control - Risk exposure with certain control / cost of control
What goes into assessing / reducing cyber risk?
Expected losses from cyber event
Deciding what to accept or transfer (to insurance)
Reduction via preventative measures
What is a reactive security posture?
Security measures that react to:
- regulation and compliance
- customer demands
- In response to breach
- In response to events
What is a proactive security posture?
Security measures that consist of the following:
- someone employed to handle cybersecurity
- Board-level conversations about cybersecurity
-
What are the arguments for better cybersecurity?
- reducing costs in the long term
- better reputation
What is cybercrime defined as?
Computer crime, or cybercrime, is a term used broadly to describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity.
What are the categorizations of cybercrime?
Computers as targets
ie) attacks on data,system,privacy integrity
Computers as storage devices
ie) stolen passwords list
Computers as communication tools i.e) illegal sales online
What are three types of intelletual property?
Real property - land and things attached to land
Personal property - tangible goods
Intellectual property - any intangible asset
Name 3 types of Intellectual Property
Patents
Trademarks
Copyrights
Name the reproduction rights a copywrite owner has:
Reproduction right: Lets the owner make copies of a work
Modification right: Also known as the derivative-works right; concerns modifying a work to create a new or derivative work
Distribution right: Lets the owner publicly sell, rent, lease, or lend copies of the work
Public-performance right: Applies mainly to live performances
Public-display right: Lets the owner publicly show a copy of the work directly or by means of a film, slide, or television image