Information Security: Barbarians at the Gateway – Gallaugher J. Flashcards
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
What is it about (Introduction)?
- Security must be top organizational priority.
- Majority of security breaches can be prevented.
- Firms suffering a security breach can experience direct financial loss, exposed proprietary information, fines, legal payouts, court costs, damaged reputations, plummeting stock prices, and more.
- Information security isn’t just a technology problem; a host of personnel and procedural factors can create and amplify a firm’s vulnerability.
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
Why is this Happening?
- Reasons:
o Corporation have a lot data
o Small employees also access to critical data
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
What are Data Harvesters ?
- Data Harvesters: steal data
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
What are Cash-out fraudsters?
buy from harvesters stolen credit cards to buy goods
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
What are botnets?
- Botnets:
o networks of infiltrated and compromised machines controlled centrally (up to 10 million computer)
o sending spam
o launching distributed denial of Services (DDoS):
overloading websites with requests shutdown
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
What is Cyberwarfare?
- Cyberwarfare: attack by terrorist or foreign power with devastating disruptions
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
What is a White hat hacker?
o White hat hacker: good guys, probe for weaknesses
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
What is a Black hat hacker?
o Black hat hacker bad guys
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
What is a Hacktivists?
o Hacktivists hacking as protest measure
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
User and Administrator Threats: What are Bad Apples?
- Bad Apples:
o 70% security incidents involve insiders
o Temporary work contracts and outsourcing increases risk
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
User and Administrator Threats: What is Social Engineering:?
- Social Engineering:
o Tricking employees into revealing information or performing tasks
o With access to personal info (LinkedIn), much easier to trick
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
User and Administrator Threats: What is Phishing?
- Phishing:
o Leverage the reputation of firm or friend to trick victim in downloading malware
o Mails masqueraded as security alert or message from employer
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
User and Administrator Threats: What is the deal with Passwords?
- Passwords:
o Typical webuser has 6,5 passwords
o Security questions (where is your mom born) can be guessed
o Alternatives
Biometrics (fingerprints)
2x authentication
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
Technology Threats: What is Malware?
- Malware
o Malicious software seeks to compromise a computing system without permission
o Common via phishing, infected USB drives
o Adobe and Microsoft primary means by which hackers try to infect
o Methods of infection:
Virus: programs that infect software or files, require executable (running programm)
Worms: Similar, but don’t need executable (scan and install themselves)
Trojans: masqueraded, tricking user to download or install something
(Chapter 13: Information Security: Barbarians at the Gateway – Gallaugher J.)
Technology Threats: What are the goals of Malware?
o Goals of Malware:
Botnets / Zombie Networks
Malicious adware: unwanted advertisement
Spyware: monitoring screens, actions and files
Keylogger: type of spyware recoding user keystrokes
Screen capture: software recording the pixel appearing on a user’s screen
Blended Threats: Attacks combining multiple malware