MIDTERMS Flashcards
The need to secure the physical location of computer technology from outside threats
COMPUTER SECURITY
German code machine Enigma in 1930’s.
ENIGMA
During these early years infosec was a straightforward process composed predominantly of physical security and simple document classification scheme.
1930s
During the cold War, many more mainframe computer were brought online to accomplish more complex and sophisticated tasks.
1960s
-Developed the ARPANET
-Program plan June 3, 1968
PROGRAM PLAN
-Is the master document describing a major program.
DR. LARRY ROBERTS
During the next decade ARPANET became more popular and saw wider use increasing the potential of misuse.
-Individual remote site did not have sufficient controls to protect data from unauthorized remote users.
-Vulnerability of password structure and formats
-Lack of safety procedures for dial-up connections
-Phone numbers were widely distributed.
1970s, and 1980s
-Network security was commonly referred to as network security.
ARPANET
-Creator of Ethernet
-Identified the fundamentals problems with ARPANET security (1973)
ROBERT METCALFE
1990s
-The first global network of networks
-The internet brought connectivity to a virtually all computers that could reach a phone line or an internet connected LAN
INTERNET
-The DEFCON conference was held in Las, Vegas.
-White Hats
-Black Hats
-Antivirus products became extremely popular
1993
Law enforcement and security professionals
WHITE HATS
-Internet brings millions of unsecured computer networks.
-Awareness of the need to improve InfoSec, as well as realization that InfoSec is important to National Defense
2000s – Present
DUTIES OF PIC/PIP
- TRANSPARENCY
- PROTECTION
- DATA INTEGRITY
- LAWFUL PROCESSING
RIGHTS OF DATA SUBJECT
- INFORMED CONSENT
- OBJECT
- ACCESS
- CORRECTION
- ERASURE
- DAMAGES
- DATA PORTABILITY
Refers to a natural or juridical person, or any other body who controls the processing of personal data, or instructs another to process personal data on its behalf
PERSONAL INFORMATION CONTROLLER
Refers to an individual (natural person) whose personal, sensitive personal, or privileged information is processed.
DATA SUBJECT
Any and all forms of data which under the rules of court or other pertinent laws constituted privileged communication
PRIVILEGED INFORMATION
Refers to any operation or any set of operation performed upon personal data such as collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of data.
CONCEPT: PROCESSING
Personal information whose leakage could impact the material well being of an individual is considered as sensitive PII
SENSITIVE PERSONAL INFORMATION
Information directly attributable to an individual
* Name
* Home Address
* Phone Number
PERSONAL INFORMATION
-The redirection of legitimate web traffic to an illegitimate site for the purpose of obtaining private information.
PHARMING
An attempt to gain personal or financial information from an individual, usually by posing as a legitimate entity.
PHISHING
The process of using skills to convince people to reveal access credentials or other valuable information to the attacker.
SOCIAL ENGINEERING
An attacker routes large quantities of e-mail to the target.
MAIL BOMBING
THE PRIVACY ECOSYSYEM
DATA Subject –Provide Personal Data
* Personal Information
* Sensitive Personal Information
* Privilege Information
-Personal Information Controller – outsources the processing
-Personal Information Processor – share data – third parties
An attack is an act that takes advantage of a vulnerability to a compromise a controlled system.
ATTACK
Is an identified weakness in a controlled system, where controls are not present or are no longer effective.
VULNERABILITY
TCP Hijacking attack, an attacker monitors packets from a network, modifiers them, and inserts them back into the network.
MAN IN THE MIDDLE
A technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.
MAN IN THE MIDDLE