Exam 1 Flashcards
OSI Layer “Please”
- Physical
OSI Layer “Do”
- Data Link
OSI Layer “Not”
- Network
OSI Layer “Throw”
- Transport
OSI Layer “Sausage”
- Session
OSI Layer “Pizza”
- Presentation
OSI Layer “Away”
- Application
The name fo the Internet standards architecture is _________
TCP/IP
________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication.
Rate limiting
Threat Environment
The threat environment consists of the types of attackers and attacks that companies face
Security Goals
Confidentiality, Integrity, Availability
Confidentiality
Confidentiality means that people cannot read sensitive information, either while it is on the a computer or while it is traveling across a network
Integrity
Integrity means that attackers cannot change or destroy information, either while it is on a computer or while it is traveling across a network. Or, at least, if information is changed or destroyed, then the receiver can detect the change or restore destroyed data.
Availability
Abailability means that people who are authorized to use information are not prevented from doing so
Compromises
Successful attacks (aka incidents, breaches)
Countermeasures
Tools used to thwart attacks (aka safeguards, protections, and controls)
Types of countermeasures
Preventative
Detective
Corrective
PCI-DSS
Payment Card Industry-Data Security Standard
Rules for companies that accept credit card purchases
Has 12 requirements
Employees and ex-employees are dangerous because:
They have knowledge of internal systems
They often have teh permission to access systems
They often know how to avoid detection
Employees generally are trusted
(IT and especially IT security professionals are the greatest employee threats)
Employee sabotage
Destruction of hardware, software, or data
Plant time bomb or logic bomb on computer
Employee hacking
hacking is intentionally accessing a computer without AUTHORIZATION or in excess of authorization
Employee financial threat
Misappropriation of assets
theft of money
Employee theft of intellectual property (IP)
Copyrights, patents, and trade secrets
Employee extortion
Perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim’s interest
Employee internet abuse
Downloading pornography, which can lead to sexual harassment lawsuits and viruses.
Downloading pirated software, music, and video, which can lead to copyright violation penalties.
Excessive personal use of the internet at work
Employee carelessness
Loss of computers or data media containing sensitive information.
Careless leading to the theft of such information
Malware
A generic name for “evil software”
Viruses
Programs that attach themselves to legitimate programs on the victim’s computer
Spread today primarily by email
Also by instant messaging, file transfers, etc.
Worms
Full programs that do not attach themselves to other programs
Like viruses, can send by email, IM, and file transfers.
Direct-propagation worms can just from one computer to another without human intervention on the receiving computer and can therefore spread extremely rapidly.
Blended threats
Malware propagates in several ways – like worms, viruses, compromised webpages containing mobile code, etc.
Payloads
Pieces of code that do damage
Implementation by viruses and worms after propagation.
Malicious payloads are design to do heavy damage.