hh Flashcards

1
Q

“The quality or state of being secure—to be free from danger”

A

Security

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of security

A

Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security

Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Critical Characteristics of Information

A

Availability
– Accuracy
– Authenticity
– Confidentiality
– Integrity
– Utility
– Possession

Availability
– Accuracy
– Authenticity
– Confidentiality
– Integrity
– Utility
– Possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of an Information System

A

Software
– Hardware
– Data
– People
– Procedures
– Network

Software
– Hardware
– Data
– People
– Procedures
– Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SDLC

A

Systems Development Life Cycle

Systems Development Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

methodology for design and implementation of information system within an organization

A

Systems Development Life Cycle (SDLC):

Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SLDC 6 general phrases

A

Investigation
Analysis
Logical design
Physical design
Implementation
Maintenance and change

Investigation
Analysis
Logical design
Physical design
Implementation
Maintenance and change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Preliminary cost-benefit analysis is developed

A

Investigation

determine what new system is expected to do and how it will interact with existing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

determine what new system is expected to do and how it will interact with existing systems

A

Analysis

Data support and structures capable of providing the needed inputs are identified

Creates and develops blueprints for information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data support and structures capable of providing the needed inputs are identified

A

Logical Design

Technologies to support the alternatives identified and evaluated in the logical design are selected

Components evaluated on make-or-buy decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technologies to support the alternatives identified and evaluated in the logical design are selected

A

Physical Design

Needed software created

Components ordered, received, and tested

Users trained and documentation created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Needed software created

A

Implementation

Longest and most expensive phase

Consists of tasks necessary to support and modify system for remainder of its useful life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Longest and most expensive phase

A

Maintenance and Change

Maintenance and Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information Security Project Team

A
  • A number of individuals who are experienced in one or more facets of required technical and nontechnical areas:
    – Champion
    – Team leader
    – Security policy developers
    – Risk assessment specialists
    – Security professionals
    – Systems administrators
    – End user

responsible for the security and use of a particular set of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

responsible for the security and use of a particular set of information

A

Data owner

ownership of ideas and control over the tangible or virtual representation of those ideas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

responsible for storage, maintenance, and protection of information

A

Data custodian

responsible for storage, maintenance, and protection of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

end users who work with information to perform their daily jobs supporting the mission of the organization

A

Data users

end users who work with information to perform their daily jobs supporting the mission of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an object, person, or other entity that represents a constant danger to an asset

A

Threat

an object, person, or other entity that represents a constant danger to an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

control over tangible/virtual ownership of ideas

A

Intellectual property (IP):

Intellectual property (IP):

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Malware attacks

A

Viruses
– Worms
– Trojan horses
– Logic bombs
– Back door or trap door
– Polymorphic threats
– Virus and worm hoaxes

Develops software scripts and program exploits

Usually a master of many skills

Will often create attack software and share with others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Develops software scripts and program exploits

A

Expert hacker

Many more unskilled hackers than expert hackers

Use expertly written software to exploit a system

Do not usually fully understand the systems they hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Many more unskilled hackers than expert hackers

A

TRUE

Unskilled hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

“cracks” or removes software protection designed to prevent unauthorized duplication

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

hacks the public telephone network

A

Phreaker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

much more sinister form of hacking

A

Cyberterrorism

much more sinister form of hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Illegal taking of another’s physical, electronic, or intellectual property

A

Theft

Illegal taking of another’s physical, electronic, or intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Acts or actions that exploits vulnerability (i.e., an identified weakness) in controlled system

28
Q

includes execution of viruses, worms, Trojan horses, and active Web scripts with intent to destroy or steal information

A

Malicious code

includes execution of viruses, worms, Trojan horses, and active Web scripts with intent to destroy or steal information

29
Q

transmission of a virus hoax with a real virus attached; more devious form of attack

A

Hoaxes

transmission of a virus hoax with a real virus attached; more devious form of attack

30
Q

Types of attacks

A

Types of attacks

Back door
Password crack
Brute force:
Dictionary:
Denial-of-service (DoS):
Distributed denial-of-service (DDoS)
Spoofing:
Man-in-the-middle:
Spam
Mail bombing:
Sniffers
Phishing:
Pharming:
Social engineering:

31
Q

Back door

A

Back door

gaining access to system or network using known or previously unknown/newly discovered access mechanism

32
Q

attempting to reverse calculate a password

A

Password crack

attempting to reverse calculate a password

33
Q

trying every possible combination of options of a password

A

Brute force

trying every possible combination of options of a password

34
Q

selects specific accounts to attack and uses commonly used passwords (i.e., the dictionary) to guide guesses

A

Dictionary

selects specific accounts to attack and uses commonly used passwords (i.e., the dictionary) to guide guesses

35
Q

attacker sends large number of connection or information requests to a target

Target system cannot handle successfully along with other, legitimate service requests

May result in system crash or inability to perform ordinary functions

A

Denial-of-service (DoS):

attacker sends large number of connection or information requests to a target

Target system cannot handle successfully along with other, legitimate service requests

May result in system crash or inability to perform ordinary functions

36
Q

attacker sends large number of connection or information requests to a target

A

Distributed denial-of-service (DDoS)

coordinated stream of requests is launched against target from many locations simultaneously

37
Q

technique used to gain unauthorized access; intruder assumes a trusted IP address

A

Spoofing

technique used to gain unauthorized access; intruder assumes a trusted IP address

38
Q

attacker monitors network packets, modifies them, and inserts them back into network

A

Man-in-the-middle

attacker monitors network packets, modifies them, and inserts them back into network

39
Q

unsolicited commercial e-mail; more a nuisance than an attack, though is emerging as a vector for some attacks

A

Spam

unsolicited commercial e-mail; more a nuisance than an attack, though is emerging as a vector for some attacks

40
Q

also a DoS; attacker routes large quantities of e-mail to target

A

Mail bombing

also a DoS; attacker routes large quantities of e-mail to target

41
Q

program or device that monitors data traveling over network; can be used both for legitimate purposes and for stealing information from a network

A

Sniffers

program or device that monitors data traveling over network; can be used both for legitimate purposes and for stealing information from a network

42
Q

an attempt to gain personal/financial

43
Q

Spam

A

unsolicited commercial e-mail; more a nuisance than an attack, though is emerging as a vector for some attacks

Example: Man-in-the-middle attacks can intercept sensitive information.

44
Q

Mail Bombing

A

also a DoS; attacker routes large quantities of e-mail to target

Example: Spam emails can overload a recipient’s inbox.

45
Q

Sniffers

A

program or device that monitors data traveling over network; can be used both for legitimate purposes and for stealing information from a network

Example: Mail bombing can be used for network security monitoring.

46
Q

Phishing

A

an attempt to gain personal/financial information from individual, usually by posing as legitimate entity

Example: Sniffers can be used to steal login credentials.

47
Q

Pharming

A

redirection of legitimate Web traffic (e.g., browser requests) to illegitimate site for the purpose of obtaining private information

Example: Phishing emails often lead to fake login pages.

48
Q

Social Engineering

A

using social skills to convince people to reveal access credentials or other valuable information to attacker

Example: Pharming can involve impersonating a trusted individual.

49
Q

Laws

A

rules that mandate or prohibit certain societal behavior

Example: Social engineering tactics can manipulate human behavior.

50
Q

Ethics

A

define socially acceptable behavior

Example: Laws are enforced by legal authorities.

51
Q

Cultural Mores

A

fixed moral attitudes or customs of a particular group; ethics based on these

Example: Ethics guide decision-making in professional settings.

52
Q

legal obligation of an entity extending beyond criminal or contract law; includes legal obligation to make restitution

Example: Liability can result in financial compensation.

53
Q

to compensate for wrongs committed by an organization or its employees

Example: Liability insurance protects against legal claims.

A

Restitution

54
Q

insuring that employees know what constitutes acceptable behavior and know the consequences of illegal or unethical actions

Example: Restitution can involve disciplinary actions.

A

Due Care insuring that employees know what constitutes acceptable behavior and know the consequences of illegal or unethical actions

Example: Restitution can involve disciplinary actions.

55
Q

making a valid effort to protect others; continually maintaining level of effort

Example: Due care involves proactive risk management.

A

Due Diligence

56
Q

court’s right to hear a case if the wrong was committed in its territory or involved its citizenry

Example: Due diligence is essential in legal proceedings.

A

Jurisdiction

57
Q

right of any court to impose its authority over an individual or organization if it can establish jurisdiction

Example: Jurisdiction determines which court has legal authority.

A

Long-arm Jurisdiction

58
Q

body of expectations that describe acceptable and unacceptable employee behaviors in the workplace

Example: Policies set guidelines for employee conduct.

59
Q
  • Dissemination (distribution)
  • Review (reading)
  • Comprehension (understanding)
  • Compliance (agreement)
  • Uniform enforcement

Example: Policy dissemination ensures all employees are informed.

A

Criteria for policy enforcement

60
Q

Types of Law

A

Civil
- Criminal
- Private
- Public

Example: Different types of law govern various aspects of society.

61
Q

governs nation or state; manages relationships/conflicts between organizational entities and people

Example: Civil law covers disputes between individuals.

62
Q

addresses violations harmful to society; actively enforced by the state

Example: Criminal law punishes illegal actions.

63
Q

regulates relationships between individuals and organizations

Example: Private law governs contracts between parties.

64
Q

regulates structure/administration of government agencies and relationships with citizens, employees, and other governments

Example: Public law governs government operations.

65
Q

One of the hottest topics in information security
- Is a “state of being free from unsanctioned intrusion”
- Ability to aggregate data from multiple sources allows creation of information databases previously impossible

Example: Privacy laws protect personal data.

66
Q

occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes

Example: Identity theft can lead to financial loss.

A

Identity Theft