Security Flashcards
What is information security?
All the processes and policies designed to protect an orgs info and IS from unauthorized access, use, disclosure, disruption, modification, or destruction
What is a Threat to an info source?
any danger to which a system may be exposed
What is the exposure of an info resource?
The harm, loss, or damage that can result if a threat compromises that resource
What is an info resources vulnerability
Possibility that a threat will harm that resource
What is cybercrime?
illegal activities conducted over computer networks, particularly the internet
What are 5 factors contributing to vulnerability of organizational resources?
- Interconnected, interdependent, wirelessly networked business environment
- Smaller, faster, cheaper computers and storage devices
- Decreasing skills necessary to be a computer hacker
- International organized crime taking over cybercrime
- Lack of management support
What are human errors risk areas
Higher level employees and greater access privileges are a greater threat
2 areas: HR and IS
What are human mistakes
- Carelessness with devices
- Opening questionable emails
- Careless internet surfing
- Poor passwords
- Carelessness with one’s office
- Carelessness using unmanaged devices
- Carelessness with discarded equipment
- Careless monitoring of environmental hazards
What is social engineering
An attack in which the perpetrator uses social skills to trick a legitimate employee into providing confidential company information such as passwords
What are social engineering methods
- Impersonation: pretending to be a manager of an IS employee
- Tailgating: following behind an employee to enter restricted areas
- Shoulder surfing: watching over shoulder
Examples of deliberate threats to IS
- Espionage
- Theft of equipment and info
- ID theft
- Software attacks
What is espionage/trespass
Occurs when an unauthorized individual attempts to gain illegal access to an orgs info.
Used for competitive intelligence
What is identity theft
Deliberate assumption of another person’s identity, usually to gain access to their financial info or to frame them for a crime
Stealing mail, stealing personal info, infiltrating orgs that store large amounts of personal info, phishing
What are the types of software attacks?
- Remote attacks needing user action
- Remote attacks needing no user action
- Attacks by a programmer developing system
What are types of remote attacks needing user action
- Virus: malicious actions by attaching to another computer program
- Worm: malicious actions and will spread by itself
- Phishing: deception to acquire info
- Spear phishing: attacks a large group of people