ISMN Exam 2 Flashcards

1
Q

GDPR (General Data Protection Regulation)

A

Toughest privacy and security law in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security

A

Degree of protection against criminal activity, danger, damage, loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Security

A

All the processes and policies designed to protect and organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat to an information resource

A

Any danger to which a system may be exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exposure of Information Resource

A

Harm, loss, damage that can result if a threat compromises that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability to a information resource

A

Possibility that a threat will harm that will harm that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 key contributors to the increasing vulnerability of organizational informational resources:

A
  • Interconnected, wirelessly networked business environment
  • Smaller, faster, cheaper computers/devices
  • Decreasing skills necessary to be a computer hacker
  • Int’l organized crime becoming cybercrime
  • Lack of management support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Espionage/Trespass

A

Attacker/unauthorized individual attempts to gain illegal access to organizational information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Extortion

A

Attacker threatens to steal or actually steals information from a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sabotage/Vandalism

A

Deliberate acts that involve defacing an organization’s website [web defacement attack]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intellectual Property

A

Property created by individuals or corporations that is protected under trade secret, patent, and copyright laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity Theft

A

Deliberate assumption of another person’s identity, usually to gain access to his/her financial information or to frame them for a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

Malicious software designed to wreak havoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do Viruses do?

A

Damage programs, delete files, reformat hard drives and/or restrict access to programs/internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do Worms do?

A

Self replicate & spread to other computers (modifies/deletes files and/or depletes
system resources [hard drive space / bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ransomware

A

[Form of digital extortion]
Blocks access to an individual computer or an organization’s computer system/network
Encrypts an organization’s data until the organization pays a sum
of money (usually in bitcoin).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Doxxing

A

Sometimes, rather than threatening to delete data if ransom isn’t
paid, cybercriminals threaten to release the data to the public
(private / sensitive customer data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Botnets

A

collection of infected computers [bots] controlled by a remote player [bot
master/herder]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Distributed Denial of Service (DDoS)

A

Aims to make a website or network unusable by
flooding it with malicious traffic or data from multiple infected computers [botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Phishing Attacks

A

Use deception to acquire sensitive personal information by masquerading
as official-looking e-mails, instant messages or tex

21
Q

Spear Phishing Attacks

A

Personalized phishing attacks that target specific individuals or
organizations

22
Q

Whale Phishing Attacks

A

Spear phishing towards high-value individuals to steal sensitive info from
companies (usually targeting executives and HR department

23
Q

Alien Software (Pestware)

A

Adware, spyware, Spamware, cookies
software secretly installed on a computer without the knowledge of the user
Typically, not as malicious as viruses/worms – mainly used for advertising/marketing
Allows others to track your web surfing habits and other personal behaviors

24
Q

Spyware

A

collects personal information about users without their consent

25
Q

Keystroke loggers (keyloggers)

A

Records your keyboard strokes & internet
browsing history

26
Q

Screen scrapers

A

record a “movie” of screen contents and activities

27
Q

Stalkerware

A

Powerful surveillance functions which include keylogging, making
screenshots, monitoring internet activity, recording location, recording video and
phone calls, and intercepting app (Skype, Facebook, WhatsApp, Snapchat
iMessage,etc) communications

28
Q

Spamware

A

sends unsolicited emails to everyone in your email address book that looks
like it came from you. Mainly used for advertising but can include viruses/worms

29
Q

Adware

A

Software that causes pop-ups

30
Q

SCADA (Supervisory Control and Data Acquisition attacks)

A

Attacks big power grids and other infrastructure

31
Q

Cyberterrorism/warfare

A

Use computer systems to harm real people/places, often for political agenda

32
Q

Single Most Valuable Control is

A

User Education and Training

33
Q

3 major ways companies protect against threats

A

Education
Information Security Controls
Risk Management

34
Q

Information Security Controls

A

Designed to protect all of the
components of an information system – including data, software,
hardware, and networks.

35
Q

3 main types of Information Security Control

A

Physical Controls
Access Controls
Communications Controls

36
Q

Firewalls

A

Systems that prevent unauthorized internet users from accessing private networks

37
Q

Anti-Malware Systems (Antivirus software):

A

Software that attempts to identify and eliminate viruses, worms and other
malicious software.

38
Q

Whitelisting

A

Process in which a company (IT Dept) identifies the only applications/websites that it will allow to run/access on

39
Q

Blacklisting

A

process in which a company IT Dept identifies applications/websites that it will not allow to run/access on
computers

40
Q

Encryption

A

process of converting (scrambling) an original message into a form that cannot be read by anyone except the
intended receiver
Uses a public key (locking) and private key (unlocking)
Digital Certificates (certified by a 3rd party certificate authority)

41
Q

Virtual Private Network (VPN)

A

private/secure network (out on
the internet) that remote users (internal employees/external
vendors/customers) can connect to & access/share information.

42
Q

Transport Layer Security (TLS)

A

Secures transactions on the
internet (credit card purchases/online banking); encrypts and
decrypts data between a Web server and browser

43
Q

Employee Monitoring Systems

A

proactive approach of protecting
against human mistakes. Monitors e-mail activities & internet
browsing activities.

44
Q

Information System Auditing

A

Examination of information systems, their inputs, outputs, and processing. Considers all the potential hazards and controls in information systems. Focuses on issues such as operations, data integrity, software applications, security and privacy, budgets &
expenditures, cost control, and productivity.

45
Q

What affects your organization’s cyber insurance costs?

A

Size and Industry
* Amount and Sensitivity of Data
* Annual Revenue
* Strength of Information Security Measures

46
Q

Functions of Risk Mitigation

A

Implementing controls to prevent identified threats from
occurring (protect it from happening)
* Developing a means of recovery if the threat becomes a reality
(steps to take if it does happen)

47
Q

3 Steps of Risk Analysis

A

Assessing the value of each asset being protected
* Estimating the probability that each asset will be compromised
* Comparing the probable costs of the asset’s being
compromised with the costs of protecting the asset

48
Q

3 most common Risk Mitigation strategies:

A

Risk Acceptance
Risk Limitation
Risk Transference (Insurance)