Security & Privacy (EXAM #2) Flashcards
Information Security
the degree a system and its data are resistant to and protected from harm from a specific threat.
Security breach
any incident that causes harm or unauthorized access to systems or their data
-direct monetary damages, negative impact on firm’s market value and reputation, or lead to government penalties
Reasons of being a victim in security breach:
- have an identity
- know other people
- have access to computing resources (laptop, etc)
Types of identity theft:
- Financial Identity Theft
- Medical Identity Theft
- Criminal Identity Theft
- Child Identity Theft
identity theft
the unauthorized use of a person’s private information for gain
Financial Identity Theft
stealing another person’s credit card or bank account number. This may also include using one’s identity (social security number, address, name, etc.) to apply for a credit card or loan that may impact credit ratings or cause unmerited financial obligations.
Medical Identity Theft
stealing another person’s personal information to obtain medical care, buy drugs, or submit fake billings to an insurance company. Aside from its financial consequences, it could be life threatening if wrong information is inserted into one’s medical records and wrong medical actions are taken based on these records.
Criminal Identity Theft
giving another person’s name, date of birth, driver’s license number, etc., to a law enforcement officer during an investigation or upon arrest. This may result in false criminal records, fines, or other illegal actions.
Child Identity Theft
stealing a minor’s social security number for personal gain. This type of fraud can go undetected for years, and it may not be discovered until a child’s later years (when applying for a driver’s license, a bank account, etc.).
Know other people
-attackers try to exploit other people’s social networks to steal from or harm their friends, work colleagues, and acquaintances.
- EX: attackers may break into a person’s email or social networking accounts to send messages to their friends and people in their contact list.
- appears to come from a trusted source, but are direct contacts to a fraudulent website, spread malware (malicious software such as a viruses), advertise unwanted products, send spam mail, or solicit friends for sensitive information.
Access to computing resources
- anyone who owns a computer may be vulnerable to a security breach
- people can use unsecured computer resources to perform a variety of illegal activities (downloading illegal software, gambling, hosting illegal materials, or visiting bad sites)
- can install malware on victim’s computer that can be used to attack other people or organizations. EX: attacker can spread virus to millions of computers and turn them into zombies or bots. Using the army of infected computers, the attacker can attack an organization or government
- risk of experiencing hardware failure that may result in loss of information (personal files, pictures, music)
zombies/bots
computer that can be controlled by a third party after being infected
Who causes security threats?
- hackers
- malicious insider threats
- non-malicious threats
Hacker
-people who try to attack an organization from the outside
-variety of motivations:
+for the challenge or curiosity
+receive monetary compensation for breaking into a computer system, stealing or destroying info
Hactivists
- hackers who are activists
- promote political ends through breaking into computers or networks. They may deface a website (changing the appearance or content of a website) that is contrary to their opinion or make confidential information public to accomplish their political objective.
Cyberterrorists
refer to hackers who use the internet to accomplish terrorist acts. Cyberterrorist acts may include disrupting or destroying an organization’s or nation’s infrastructure, such as disrupting a nation’s power supply or communication lines.
Cyberwarfare
refers to nations or groups that conduct espionage or sabotage of another nation’s or organization’s information and infrastructure through hacking techniques
White-hat hackers
hackers hired by organizations to break into their systems to expose vulnerabilities so the organizations can fix them
malicious insider threats
- A legitimate and trusted members of an organization who compromise security
- adversary who operates as a trusted member of an organization to intentionally harm it
-EX: purposely install malware on a system, steal or expose sensitive information, sabotage systems, delete information, steal hardware, or perform financial fraud
non-malicious threats
- users who put their organization at risk by not complying with the suggested security policy because of ignorance or non-malicious negligence
- EX: create weak passwords, not updating antivirus programs, not locking computers or office doors, visiting websites infected with malware, and disclosing sensitive information in emails or conversations
computer crime
a crime that targets a computer, or using a computer to commit theft
Internet crime
crime that specifically involved the internet, such as soliciting information to commit identity theft
CIA Triad
-security threats and countermeasures
- Confidentially
- Availability
- Integrity
Confidentially
Restricting access to information and resources to those who are authorized to use it
EX: online bank account is protected with a username and password to ensure that only the owner can access it
- ensuring that people who have access to that information don’t disclose that information to other unauthorized people
- enforced through a two step process: authentication & authorization
authentication
- refers to who you are
- accomplished through:
a. something you know
b. something you have
c. something you are
something-you-know
- include a username, password, or other information that you must retrieve from memory to enter in a login screen
- this is the most common form of authentication