ITSAC - midterms Flashcards

1
Q

What is Information Security?

A

A set of security procedures and tools that broadly protect sensitive enterprise information from misuse, unauthorized access, disruption, or destruction. – Microsoft
It refers to the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction, and inspection. – Cisco
Information security in today’s enterprise is a “well-informed sense of assurance that the information risks and controls are in balance.” – Jim Anderson, Inovant (2002)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

History

A

Began immediately after the first mainframes were developed.
Created to aid code-breaking computations during World War II.
Physical controls to limit access to sensitive military locations to authorized personnel: badges, keys, and facial recognition.
Rudimentary in defending against physical theft, espionage, and sabotage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

History
Early 1960s

A

One of the first documented security problems occurred.
A software glitch mixed the two files (Message of the Day and password file)
The entire password file was printed on every output file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

History
Early 1970s

A

The microprocessor brought in a new age of computing capabilities and security threats as these microprocessors were networked.
Late 1970s: microprocessor expanded computing capabilities and security threats.
From mainframe to PC
Decentralized computing
Need for sharing resources increased
Major changed computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

History
RAND Report R-609

A

The first widely recognized published document to identify the role of management and policy issues in computer security.
It attempted to define multiple controls and mechanisms necessary for the protection of a multi-level computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

History
The 1990s

A

At the close of the 20th century, as networks of computers became more common, as did the need to connect the networks to each other.
Gave rise to the Internet - first global network of networks
Early Internet deployment treated security as a low priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

History
In the late 1990s and into the 2000s

A

Many large corporations began publicly integrating security into their organizations.
Antivirus products became extremely popular, and information security began to emerge as an independent discipline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

History
2000 to present

A

The Internet brings millions of computer networks into communication with each other—many of them unsecured.
Ability to secure a computer’s data influenced by the security of every computer to which it is connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Security?

A

A successful organization should have the following multiple layers of security in place for the protection of its operations.

  1. Physical security - to protect the physical items, objects, or areas of an organization from unauthorized access and misuse.
  2. Personal security - to protect the individual or group of individuals who are authorized to access the organization and its operations.
  3. Operations security - to protect the details of a particular operation or series of activities.
  4. Communications security - to protect an organization’s communications media, technology, and content.
  5. Network security - to protect networking components, connections, and contents.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Critical Characteristics of Information

A
  1. Availability - enables users who need to access information to do so without interference or obstruction and in the required format.
  2. Accuracy - free from mistake or error and having the value that the end-user expects.
  3. Authenticity - the quality or state of being genuine or original, rather than a reproduction or fabrication.
  4. Confidentiality - the quality or state of preventing disclosure or exposure to unauthorized individuals or systems.
  5. Integrity - the quality or state of being whole, complete, and uncorrupted. The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption of its authentic state.
  6. Utility - the quality or state of having value for some purpose or end. Information has value when it serves a particular purpose. This means that if information is available, but not in a format meaningful to the end-user, it is of no use.
  7. Possession - the quality or state of having ownership or control of some object or item. Information is said to be in possession if one obtains it, independent of format or another characteristic. While a breach of confidentiality always results in a breach of possession, a breach of possession does not always result in a breach of confidentiality.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information system (IS)

A

– is the entire set of software, hardware, data, people, procedures, and networks that enable the use of information resources in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Components of an Information System

A
  1. Software: Includes applications (programs), operating systems, and assorted command utilities.
    Perhaps the most difficult IS component to secure.
    Easy target of accidental or intentional attacks.
  2. Hardware: Physical technology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system.
    Physical security policies deal with hardware as a physical asset and with the protection of physical assets from harm or theft.
  3. Data: Often the most asset
    Main target of intentional attacks
  4. People: People have always been a threat to information security
    Social engineering
    Must be well trained and informed
  5. Procedures: Procedures are written instructions for accomplishing a specific task.
    Threat to integrity of data
  6. Networks: Locks and keys won’t work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Balancing Information Security and Access

A

To operate an information system that satisfies the end-user and the security professional, the security level must allow reasonable access yet protect against threats to achieve a balanced scale.
An imbalance can occur when the needs of the end user are undermined by obsessive focus on protecting and administering the information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer as the Subject and Object of an Attack

A

Hacker using a computer as the subject of attack
Remote system that is the object of an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Approaches to Information Security Implementation: Bottom-Up Approach

A

Bottom-up approach:

A method of establishing security policies and/or practices that begins as a grassroots effort in which systems administrators attempt to improve the security of their systems.
The key advantage is the technical expertise of individual administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantages & Disadvantages of
Bottom-Up Approach

A

Advantages:

  1. Flexibility: Bottom-up approach allows for changes to be made at any stage of the process.
  2. Empowerment: It gives individuals and smaller groups the power to make decisions.
  3. Robustness: This approach can result in more robust solutions, as each component can be thoroughly tested and debugged.

Disadvantages:

  1. Slow Progress: The bottom-up approach can be slow, as each component must be completed before moving on to the next.
  2. Lack of Coherence: The final solution may lack coherence, as it is assembled from individual parts.
  3. Difficulty in Managing Complex Projects: This approach can be difficult to manage for complex projects with many components.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What Companies Use a Bottom-up Approach?

A

Many companies use the bottom-up approach in their management and decision-making processes, including:

Toyota
Hyundai
Ford
Volkswagen
Samsung
Nokia
Dell
Hewlett-Packard
Cisco Systems
Oracle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Approaches to Information Security Implementation: Top-down Approach

A

A methodology of establishing security policies and/or practices that is initiated by upper management.
Higher probability of success.
The project is initiated by upper-level managers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Advantages & Disadvantages of
Top-Down Approach

A

Advantages:

  • Easy to understand and implement.
  • Provides clear objectives and expectations.
  • Supports effective allocation of resources.

Disadvantages:

  • Inflexible to change.
  • Limited to pre-determined solutions.
  • Can lead to missed opportunities or inefficiencies.
  • Can result in lower motivation and participation from lower-level employees.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What Companies Use the Top-Down Approach?

A

Many companies use the top-down approach in their management and decision-making processes, including:

IBM
Microsoft
Google
Apple
Amazon
GE
Intel
JPMorgan Chase
Goldman Sachs
Procter & Gamble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

4 FUNCTIONS OF INFO SECURITY IN ORG

A
  • Protecting the ability to function
  • Enabling safe operation
  • Protecting data
  • Safeguarding technology assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • object, person, or either entity that represents a consant danger to an asset
A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

includes acts done without malicious content
caused by inexperience, improper training, and incorrect assumptions
other circumtances - Employees are the greatest threats — closest to org’s data

A

acts of human error or failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • broad category
  • unauthorized accessing of info
  • competitive advantage vs espionage
  • shoulder surfing can occur any place a person is accessing confidential info
  • Controls implemented to mark the boundaries of an organization’s virtual territory giving notice to trespassers that they are encroaching on the organization’s cyberspace​
  • Hackers uses skill, guile, or fraud to steal the property of someone else​
A

espionage/trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
**`Espionage` vs. `Tresspass`**
**Espionage** - getting other's recipe (`illegal`) **Tresspass** - buying other's product and determining what ingredients are needed (`legal`)
26
* an attacker or formerly trusted insider **stealing information** from a computer system and **demands compensation** for its return or non-use * extortion found in credit card number theft
**Information Extortion**
27
* indiv or group wo want to sabotage/destroy the operation * petty vandalism to organized sabotage * orgs rely on image so web defacing can lead to droppiung consumer * higher threat of hactivist or cyberactivist operations * * most extreme of cyber-terrorism
**sabotage or vandalism**
28
illegal taking another's property --- physical, electronic, intellectual
**Deliberate acts of Theft**
29
**Physical, electronic & intellectual theft**
- **Physical Theft**: Stealing tangible objects (e.g., money, jewelry, or cars). `locked doors/alarm system` - **Electronic Theft**: Unauthorized access or hacking to steal digital assets (e.g., credit card info, passwords). `more complex problem, org may not know it has occured` - **Intellectual Theft**: Stealing ideas, inventions, or creative works (e.g., plagiarism, patent infringement).
30
* these are unexpected and can occuer with very little warning * can disrupt not only lives of indiv, but also the storage, transmission and use of info * management ---- prepare contigency plans and limit damage
**Forces of Nature**
31
* occur when a manifacturer distributes to user's equipment containing flaws * can cause the system to perform outside of expected parameters (unreliable, lack of available) *
**Technical Hardware Failures or Errors**
32
**`Terminal` vs `Intermittent` Error**
A **terminal error** is a critical issue that stops a system or process completely. `unrecoverable loss of equipment` An **intermittent error** occurs occasionally and does not permanently disrupt the system. `faults not easily repeated`
33
attack system, creates malware
**Software Attacks**
34
* harmful software designed to damage, disrupt, or steal data from computers or networks. `malicious code/software` * designed to damage, destroy, or denyservice to the target systems
**malware**
35
spread with user interaction (needs host)
**virus**
36
spread automatically (no host)
**worms**
37
disguised as legitimate software
**trojan**
38
hides deep within PC
**rootkit**
39
monitors your activity
**spyware**
40
multiple malware in one attack
**blended threat**
41
controls your PC form a distance
**remote access**
42
maliciously feeds you ads
**adware**
43
hunts software vulnerabilities (not expert but can steal info using this)
**exploit kit**
44
tool to exploit info * is a type of malicious software that blocks access to a computer system or encrypts data until a sum of money is paid
**ransomware**
45
rekords key stroke
**keylogger**
46
denial of service
pc/s ---> server
47
**Protect yourself from keylogger**
* enable two-factor authentication * don't download unknown files * consider a virtual keyboard * use a password manager * install antivirus software * consider voice-to-text conversion software
48
is software that detects, prevents, and removes malware from computers and devices.
**Antivirus**
49
Refers to the practice of `protecting digital devices, systems, and networks from unauthorized access, theft, damage, or other malicious activities`. It includes various methods and technologies that are used to safeguard information, such as firewalls, encryption, authentication, and intrusion detection systems.
**Cyber Security**
50
`Malicious software` designed to `harm, exploit, or disrupt` devices, networks, or data. Examples include viruses, ransomware, and spyware.
**malware**
51
A cyber attack where `attackers impersonate legitimate entities` (e.g., banks, companies) to trick users into providing sensitive information like passwords or credit card details.
**phishing**
52
A `targeted form of phishing` where attackers customize messages to a specific individual or organization to gain access to confidential data.
**Spear phishing**
53
An attack where a `hacker intercepts and alters communication` between two parties without their knowledge, often to steal sensitive information.
**Man-in-the-middle attacks**
54
An attack that `overwhelms a system`, network, or website with excessive traffic, causing it to slow down or crash, making services unavailable.
**Denial of Service**
55
A cyber attack that `exploits vulnerabilities`in a website�s `database` by injecting malicious SQL code to gain unauthorized access to sensitive data.
**SQL injection**
56
A type of cyber attack that manipulates the Domain Name System (DNS) to `redirect users to fraudulent websites` or disrupt network services.
**DNS attack**
57
is `constantly evolving and changing as new threats` and vulnerabilities emerge. In recent years, there has been a significant increase in cyber attacks, data breaches, and other cyber threats, which has led to a heightened focus on cyber security.
**Cyber Security Landscape**
58
the most prevalent emerging business risk
**ransomware**
59
**THE ANATOMY OF RANSOMWARE**
1. **Reconnaissance** - gathering and analyzing infos to select vulnerabiities to enter the org 2. **Delivery** - gaining access to org's networks and data (phishing, SQL inject, web) 3. **Exploitation** - installing backdoors, exploiting alternative vulnerabilities, and exfiltrating or destroying data 4. **Impact** - demand for ransom and operational capabilities after recovery efforts
60
� refers to adhering to laws, Regulations, and industry standards that govern the use and protection of digital data
**Compliance**
61
- Developing and implementing strategies to prevent, detect, respond, and recover from cyber attacks - requires testing and updating security measures regularly to adapt to new threats and vulnerabilities
**Resilience**
62
**THE NIST CYBERSECURITY FRAMEWORK**
1. **Identify** - what procecesses and assets need protection? 2. **Protect** - implement appropriate safeguards to ensure protection of the enterprise's assets 3. **Detect** - implement approriate mechanisms to identify the occurence of cybersecurity incidents 4. **Respond** - develop techniques to contain the impacts of cybersecurity events 5. **Recover** - implement the appropriate proccesses to restore capabilities and services impaired due to cybersecurity events
63
- what procecesses and assets need protection?
**Identify**
64
- implement appropriate safeguards to ensure protection of the enterprise's assets
**Protect**
65
- implement approriate mechanisms to identify the occurence of cybersecurity incidents
**Detect**
66
- develop techniques to contain the impacts of cybersecurity events
**Respond**
67
- implement the appropriate proccesses to restore capabilities and services impaired due to cybersecurity events
**Recover**
68
- high-level overview or the org - long term plan (5+ years) - forward looking - each level of division translates plan objectives into more specific objectives - executive team (CEO, COO, CFO, CIO)
**Strategic Planning**
69
- methods used to achieve the strategy - short term plan (1-2 year or less) - includes specific goals, budget, resources - breaks down strategil goals - eg. `project plans`, resource acquisition, project budgets, project reviews - Chief Information Security Officer (CISO) and security managers
**Tactical Planning**
70
- plan day to day running - controlled via `daily/weekly/monthly/annual` - inclued necessary `tasks for all departments`, communication, and reporting requirements
**Operational Planning**
71
`High-level statements` which define roles, responsibilities, and expectations for specific domain areas. - general - what to do & not to do in org - "all company data should be protected from unauthorized access"
**Policies**
72
`Specific low-level`, mandatory controls that help enforce and support policies. - how to comply to a certain policy
**Standards**
73
`Recommended controls` that help support standards or serve as a reference for when no applicable standard is available. - not mandatory - "use password manager"
**Guidelines**
74
`Step-by-step` instructions to accomplish policies, standards, and guidelines. - specific - how to change password
**Procedures**
75
- is a `management-level document`, often written by the company's `CIO`, detailing the company's `philosophy on security`. - general policy to a whole
**1. Enterprise information security policies**
76
–  is developed by an `organization` to outline the guidelines that govern the `use of` individual `technologies` in that organization. - specific
**2. Issue-specific security policies** (ISSP)
77
- focus on the information security `policies of particular systems`. For example, policies for customer-facing applications, payroll systems, or data archive systems. - identtify security needed
**3. Systems-specific security policies**