Information security, concepts and principles Flashcards
How can software security be defined?
The practice of building software to be secure and to continue to function properly under malicious attack
Is data privacy and data security the same?
No
What is data privacy?
Compliance with data protection laws and regulations. Focuses on how to collect, process, share, archive and delete the data
What is data security?
Measures that an organization is taking in order to prevent any third party from unautherized access
What are some causes of insecure code being deployed?
Pressure of meeting deadlines. Instead create plans of dealing with them later.
Developers lack knowledge to mitigate issues identified.
How many companies suffered from successful cyberattacks last year?
86%
How many organizations are experiencing an IT security skill shortfall?
87%
Name 6 examples of threats and attacks
Web defacement
Infiltration, control hijacking
Phishing
Data theft / Data loss
DoS
Ransomware
What is web defacement?
Replace legitimate pages with illegitimate ones.
An attack on webpages that change the visual appearance of the page. This can be done by attackers who hack into servers and replaces hosted websites with malware or a website of their own.
What is malware?
Malicious software.
Software that is created to cause harm on a computer, server, client or network, such as gain authorized access or steal/leak data.
What are Trojan horses?
Malware that disguise itself as a standard program, effectively misleading users of its true intent.
Examples are malicious email attachments or fake advertisements.
What is Infiltration
Attacks where an attacker gains unauthorized access to a service.
Infiltration can consist of acts such as secretly entering, observing, or extracting sensitive information from a secure system.
What is control hijacking?
An attacker want so gain control of a machine, such as a webserver, by executing arbitrary code on the target. This can be done if the attacker is able to hijack the normal application control flow.
buffer- and integer overflows
format vulnerabilities
What is phishing?
The attacker masquerades as a reliable source to lure the victim into giving up information such as usernames, passwords, and other sensitive information.
Attack vectors: Email, sms
What is Data theft / Data loss attacks?
Unautherized acquisition. transfer or storage of confidental information belonging to an entity.
Attackers may want to sell the stolen information to other malicious parties.
What are DoS attacks?
Attacks that affect the availability of a service. These attacks can be carried out by overflowing a server with packets, causing it to drop legitimate packets and becoming unavailable to legit users.
What is ransomware?
Malware designed to block access to a computer system, or data, until a sum of money is payed.
A way of doing this is for an attacker to encrypt all of an entity’s data, and demand a ransom in exchange for the decryption.
What is the CIA triad?
Confidentiality
Integrity
Availability
What are 3 security goals, additional to the CIA triad?
Privacy
Accountability
Non-repudiation