Info Systems Exam 2 Flashcards
Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
Cyber Security
Bad things happen online
Spyware SPAM Vishing
Adware Phishing Smishing
Malware Pharming Spear Phishing
Hackers are not all the same
Script Kiddies
Sophisticated Networks
White Hats
Criminal Organizations
Black Hats
Government Sponsored
Happens to Everyone
The question is not “Have we been hacked”
The right question is “To what extent have we been hacked, and how vulnerable are we going forward.”
How do we respond / position ourselves. PR.
You can not protect against all attacks…
You should still protect yourself from attacks.
Make sure you are a difficult target.
Target hardening
Ways to Cause Issues - warez
Sniffing AirSnort
Spoofing Altering Packet Headers
Attacks - Offense
DoS
DDoS
Cain and Abel (Man in the middle)
Commonly associated with hotels
Brute Force Attack
Attacks - Offense 2
Viruses Blended
Worms Logic Bombs
Trojan Horses Ransomware
Social Engineering Backdoors
SQL Injection
Segments - where
network
drive
app or OS
Segments - How
social engineering
technology- 0s and 1s
Policies- Exploits
Segments - What happens
reveal secrets
Change data
Prevent Access
Some Things To Do - Defense
Biometrics - fingerprints / eye scans / gait / size
Mantraps - think airlock - 2 doors, 1 at a time
Firewalls - so many meanings
Intrusion Detection Systems - IDS
“Air Gap” - talk about stuxnet
Defense
Policies and Procedures
Audit and test
User Training
Recurring and everyone
Honeypot - Defense
A honeypot is setup to detect, and then mitigate attacks.
Think of fake email accounts used on common sites to see if they start to receive attacks after visiting a potentially dangerous site.
Password Policies
Complexity / Length / Strength
Frequency of change
Proper care for Passwords - KeePass
you are who you claim to be
Authentication
you have access some things
Authorization
e-Commerce Three step process:
Authentication - validates identity
Confirmation - sender gets a receipt
Non Repudiation - no backing out of the deal
Return to previous state
Disaster Recovery
Keep going forward
Business Continuity
Backups Cold Swap
Hot Swap SneakerNet
is a set of one or more fields/columns that can identify a record uniquely in a table. There can be multiple ___ Keys in one table. Each ____ Key could work as the Primary Key.
Candidate Key
s a set of one or more fields/columns of a table that uniquely identify a record in database table. It can not accept null as a value. No duplicate values.
Primary Key
is a key that can be work as a primary key. Basically it is a candidate key that currently is not defined as the primary key.
Alternate / Alternative Key
is a combination of more than one fields/columns of a table. Any of the other keys can be a ____ key simply by including multiple fields.
Composite / Compound Key