ISMN Exam 2 Flashcards
GDPR (General Data Protection Regulation)
Toughest privacy and security law in the world
Security
Degree of protection against criminal activity, danger, damage, loss
Information Security
All the processes and policies designed to protect and organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, destruction
Threat to an information resource
Any danger to which a system may be exposed
Exposure of Information Resource
Harm, loss, damage that can result if a threat compromises that resource
Vulnerability to a information resource
Possibility that a threat will harm that will harm that resource
5 key contributors to the increasing vulnerability of organizational informational resources:
- Interconnected, wirelessly networked business environment
- Smaller, faster, cheaper computers/devices
- Decreasing skills necessary to be a computer hacker
- Int’l organized crime becoming cybercrime
- Lack of management support
Espionage/Trespass
Attacker/unauthorized individual attempts to gain illegal access to organizational information.
Information Extortion
Attacker threatens to steal or actually steals information from a company.
Sabotage/Vandalism
Deliberate acts that involve defacing an organization’s website [web defacement attack]
Intellectual Property
Property created by individuals or corporations that is protected under trade secret, patent, and copyright laws.
Identity Theft
Deliberate assumption of another person’s identity, usually to gain access to his/her financial information or to frame them for a crime
Malware
Malicious software designed to wreak havoc
What do Viruses do?
Damage programs, delete files, reformat hard drives and/or restrict access to programs/internet
What do Worms do?
Self replicate & spread to other computers (modifies/deletes files and/or depletes
system resources [hard drive space / bandwidth
Ransomware
[Form of digital extortion]
Blocks access to an individual computer or an organization’s computer system/network
Encrypts an organization’s data until the organization pays a sum
of money (usually in bitcoin).
Doxxing
Sometimes, rather than threatening to delete data if ransom isn’t
paid, cybercriminals threaten to release the data to the public
(private / sensitive customer data).
Botnets
collection of infected computers [bots] controlled by a remote player [bot
master/herder]
Distributed Denial of Service (DDoS)
Aims to make a website or network unusable by
flooding it with malicious traffic or data from multiple infected computers [botnets