Information Security Flashcards
Intangible assets are….?
Assets with no physical presence: information, credibility, brand, and reputation.
Information Security threat categories include…?
- Intentional
- Natural
- Inadvertent
- Data mining
- Insiders
- Counterfeiting and Piracy
OPSEC has 5 cyclical steps:
1) Identify assets (critical information);
2) Define the threat ( collectors, capabilities, motivations);
3) Assess vulnerabilities;
4) Analyze the risk - it’s impact, priority, and any existing countermeasures; and
5) develop and implement countermeasures
What is Cryptoware?
Also known as crypto-ransomware, it is a type of harmful program that encrypts files stored on a computer or mobile divide in order to extort money.
What are four levels of information classification?
Highly restricted….restricted….internal use and unrestricted.
What are three key steps to take after an information loss?
Investigation, damage assessment and recovery and follow-up.
What are technical surveillance countermeasures (TSCM)?
Services, equipment, and techniques designed to locate, identify and neutralize technical surveillance activities.
The strategies used to safeguard information assets typically include what three components?
Security measures, legal protections and management practices.
Informational assets can take what physical forms?
Prototypes and models; manufacturing processes and equipment.
What are five business impacts of an information asset loss event?
Loss of company reputation/image/goodwill;
- Loss of competitive advantage in one …..or in multiple …..products/services;
- reduced projected returns or profitability
- loss of core business technology or process
What is data mining?
Software driven collection of open-source data and public information.
What is proprietary information?
Information of value, owned by an entity or entrusted to it, which has not been disclosed publicly.
Inappropriate links to unprotected networks, improper system configuration, or unpatched workstations are examples of..?
Vulnerability in the information systems infrastructure.
Which five information security systems (ISS) issues can also weaken physical security in a converged system?
Denial of services,
Insertion of incorrect data
Data theft
Data modification and
Data destruction
What is the best way to evaluate the current status of information security programs in your organization?
Conduct surveys
What are examples of inadvertent threats?
Inadequate employee training, misunderstandings and lack of attention to detail
Gramm-Leach-Bliley Act?
Requires financial institutions and companies that offer consumer financial products or services to explain their information sharing practices to their customers and to safeguard sensitive data.
Data breach laws put the onus of data protection on?
The organizations and agencies that house and use that information.
What is the security model that requires strict ID verification for every person and device trying to access resources on a network?
Zero trust.
How do information systems security professionals mitigate risk?
Through the development of an information Security Management System (ISMS).
Who is in charge of deciding to pay a hacker’s ransom?
Stakeholders in the business.
What are the business impacts of a loss event?
- loss of use
- loss of ownership
- loss of intellectual property rights
- loss of proprietary information or prototypes that could facilitate product counterfeiting.
There are no criminal laws regarding?
Patent infringement
An information assets protection (IAP) program focuses on?
IAP programs focus holistically on the security of information assets - including all aspects of protection….not just technology.
What does an information systems security (ISS) program focus on?
An ISS focuses on the security of information technology….for example….systems, networks, applications and the interaction between those technology components and end users. The objective of an ISS is to prudently and cost-effectively manage the risk where critical organizational information could be: compromised, changed without authorization or become unavailable.
Six ISS terms include? pg 262 in study guide
- information systems threat
- information systems vulnerability
- information systems risk
- information systems countermeasures
- residual threat risk
- Residual risk
Cyclical redundancy check (CRC)?
A tool for maintaining information integrity; it shows whether data has been altered.
Three classifications of information systems countermeasures?
- Administrative controls
- technical controls; and
- Physical controls
The ISO/IEC 2700 family of standards does what?
Provides best practices for an ISMS and takes a risk-based approach to cybersecurity by addressing people, technology and processes.
ISO 27001?
Discusses the concept of an information security management system and outlines information security management practices….policies, compliance, asset management….etc