InfoSec Part 1 Flashcards
Why secure data and information systems?
Data is often one of the most valuable assets a company can have, so securite for competitive advantage reasons
because customers depend on their info being private
because they process the data
What are digital identities and why protect them?
Login credentials
So info doesn’t fall into the wrong hands/identity theft
What are the three legs of the CIA Triad?
Confidentiality
Integrity
Availability
Confidentiality
Protect the data from unauthorized access and misuse
Authorized doesn’t mean everyone in the company
Granular access controls
Integrity
Protect data from unauthorized changes
Means its whole, complete, authentic, and complete. We can trust it
Needs to be trustworthy or we’ll lose customers
Availability
Protect the organization’s access to the data
No interruptions or delays
Risk big financial losses, missed opportunities, and lost customers
How does the CIA Triad guide our efforts to protect an organization’s data and information systems?
Each individual leg has their own ways to protect info for an organization
Organizations can choose to prioritize a leg or two over the other based on their business needs
Tradeoffs occur thru prioritizing
Find the balance that best meets your needs for you and your customers
According to the PWC report, what is the annual growth rate for security incidents? _____%
66%
According to IBM’s research, the average cost of a data breach is $_________.
$4.24 million
Be able to briefly explain these four main costs of experiencing an IT security breach: Detection
Activities that enable a company to reasonably detect the breach
Forensic investigations, assessments, crisis management, etc.
Be able to briefly explain these four main costs of experiencing an IT security breach: Notification
Activities that enable a company to notify data subjects, data protection regulators, and other third parties
Emails, letters, general notice to data subjects, etc.
Determination of regulatory requirements, engagement with outside experts, etc.
Be able to briefly explain these four main costs of experiencing an IT security breach: Lost Business
About 38% of the cost
Attempt to minimize the loss of customers, business disruption, and revenue loss from system downtime
Reputation losses, diminished goodwill
Be able to briefly explain these four main costs of experiencing an IT security breach: Post-Breach Response
Activities that help victims of a breach communicate with a company address activities to victims and regulators
Help desk and inbound communication, credit monitoring, legal expenditures, discounts
Attempt to calm the people and reduce negative impact on your reputation
Expensive!
What is PII?
Personally identifiable information
Data that you can look at and know who it belongs to
According to IBM’s research, the average cost for each breached record of PII is $_______.
$180
Reading: Biggest hack in history
How did the hackers get in?
One of the computer technicians in Saudi Aramco’s info tech team opened a scam email and clicked on a bad link
Reading: Biggest hack in history
What damage was suffered?
Entire company had to switch to using paper
No corporate email, office phones were dead
Temporarily stopped selling old domestic gas tank trucks, then started giving away oil for free
Purchased every computer hard drive in the manufacturing line, paid higher prices to cut in line of every computer company which halted drive supplies to everyone else
Would have bankrupted a smaller company
What does it mean for something to be “vulnerable”?
Susceptible to attack or harm
Data
raw data/materials, facts, figures used to build info to gain competitive advantage to make business decisions
Intellectual property
coming up with ideas and knowledge that we use to sell/create products
Competitive advantage for an organization that other people want to steal and make money from
Business processes
Can be interrupted or stopped by an attacker so we can’t do business anymore
Reputation
If we lose trust in customers, they go to another business
Corporate survival
If we take enough harm in these other areas, it could be game over
What are the broad categories of IT vulnerability?
Physical
Technological
Human
Physical
Computers, storage, documents, etc.
Technological
Computers network/software, etc.