Module 10: Information Security and Controls Flashcards
What does information security refer to?
It refers to all of the processes and policies designed to protect an organization’s information and information systems (IS) from an unauthorized access. use, disclosure, disruption, modification, or destruction
What is a threat to an information resource?
It is any danger to which a system may be exposed
What is exposure?
It is the harm, loss, or damage to a compromised resource
What is an information resource’s vulnerability?
It is the possibility that the system will be harmed by a threat
What are the two major categories of threats?
Unintentional threats are acts performed without malicious intent
Deliberate threats
What are the ten common types of deliberate threats to information systems?
Espionage or trespass
Information extortion
Sabotage or vandalism
Theft of equipment or information
Identify theft
Compromises to intellectual property
Software attacks
Alien software
Supervisory control and data acquisition (SCADA) attacks
Cyberterrorism and cyberwarfare
What are organizations doing to protect themselves?
Developing security management strategies
Allocating sufficient resources managed by a Chief Security Office or CIO
Developing software and services that deliver early warnings
Early warning systems are proactive, they can scan the Web for new viruses. alert companies to danger
What are the categories of controls?
Security is not only aspect of operational controls
Controls come in layers: control environment, general controls, application controls
What are the five key factors that threaten cybersecurity?
- Today’s interconnected, interdependent, wirelessly networked business environment
- Smaller, faster, cheaper computers and storage devices
- Decreasing skills necessary to be a computer hacker
- International organized crime taking over cybercrime
- Lack of management support
Why are Human Errors relevant to IT?
There are two important points to be made about employees
The higher the level of the employee, the greater the threat they pose to information security
Employees in two areas of the organization pose especially significant threats to information security: human resources and information systems (IS)
What are some Human Erros?
Carelessness with laptops and other computing devices
Opening questionable e-mails
Careless internet surfing
Poor password selection and use
Carelessness with one’s office
Carelessness using unmanaged devices
Carelessness with discarded equipment
Carelessness monitoring of environmental hazards
What is social engineering?
It is an attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information such as passwords
What are some techniques of social engineering?
Impersonation: presenting to be a company manager of an information systems employee
Tailgating: following behind an employee to enter restricted areas
Shoulder surfing: watching over someone’s shoulder to view data or passwords
When does espionage or trespass occur?
It occurs when an unauthorized individual attempts to gain illegal access to organizational information
What is competitive intelligence?
Legal information-gathering techniques
What is industrial espionage?
It crosses the legal boundary
What is theft of equipment or information?
Small, powerful devices with increased storage such as laptops, smart phones, digital cameras, thumb drives, and iPods are becoming easier for attackers to use to steal information
What are the causes of identity theft?
Stealing mail or dumpster diving
Stealing personal information in computer databases
Infiltrating organizations that store large amounts of personal information
Impersonating a trusted organization in an electronic communication
What is intellectual property?
It is a property created by individuals or corporations which is protected under trade secret, patent or copyright laws
What is a trade secret?
Intellectual work that is a company secret and is not based on public information
What is a patent?
Grants the holder exclusive rights on an invention or process for 20 years