Module 1: Introduction to Incident Response and Handling Flashcards
What is a Computer Security Incident
A computer security incident might be any real or suspected adverse event in relation to the security of computer systems or networks
Types of Security Attacks
- Repeated unsuccessful login attempts
- Unavailability of services due to DDoS
- Unintentional modifications to software/hardware/firmware
- Unauthorized use of systems
- System and application crashes
- Unauthorized use of other user’s accounts
- Gaining admin privilege to perform unauthorized access
Five levels of Data Classification
- Top Secret
- Highly confidential Information
- Proprietary Information
- Information of Internal Use
- Public documents
What is Information System
It is a computer system that modifies the raw data into useful information to attain specific goals for an organization or an individual
What is Information Owner
This is a person who first creates, or initiates the creation or storage of the data
What is Information Custodian
This is a person who controls and implements security required to protect the information assets classified by the information owner
Different forms of information warfare
- Hijacking television and radio transmissions
- Jamming television and radio transmissions
- Disabling logistics networks
- Spoofing or disabling the communication networks
Weapons in information warfare
- Viruses
- Worms
- Trojan Horses
- Logic Bombs
- Trap Doors
- Rootkits
- Chipping
- Nano machines and Microbes
- Electronic jamming
What are the Key Concepts of Information Security
Confidentiality
Integrity
Availability
How is Confidentiality maintained?
Through user’s authentication and access control
What does integrity refer to?
The reliability and trustworthiness of the information
What is a vulnerability
It is a flaw or weakness in the system, if exploited, might result in undesirable events such as compromise of security, violation of system integrity, etc.
Examples of a vulnerability
- Weak passwords
- Software bugs
- Virus or malware
- Script code injection or a SQL injection
What is a threat
It is an event, person, or circumstance that has the ability to damage the system by altering, deleting, disclosing of confidential information
What is an attack
Attack is the deliberate action of causing harm to the computer systems by exploiting known vulnerabilities and threats