SESSION 13 - Information Security - Barbarians at the gateway Flashcards

1
Q

Whats the article about?

A
  • Information Security is everyone’s business and need to be made a top organizational priority.
  • Firms suffering a security breach can experience direct financial loss, exposed proprietary information, fines, legal payouts, court costs, damaged reputations, plummeting stock prices, and more.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are bad apples?

A

o Around 70% of loss-causing security incidents involves insiders.
 Rogue employees can:
* Steal secrets
* Install malware.
* Hold a firm hostage.
o Temporary Workers:
 Contract workers,
 Temporary staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whats social engineering?

A

o Employees who get tricked into revealing information.
o Scams can be made based off Facebook profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whats phishing?

A

o Refers to cons (fraud) executed through technology.
o Con artists can fake bank, government, job emails through logos, standard outlines, etc.
o Some attempt to lead a person to downloading a dangerous software, which gives them information into the laptop. (Passwords, data, etc.)
o Spear Phishing specifically target a given organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats malware?

A

o Seeks to compromise a computing system without permission.
o Has access to mobile devices, embedded devices, and firms networking equipment.
o Uses weaknesses such as browsers, plug-ins, etc.
o Methods of infecting:
 Virus:
* Programs that infect other software or files.
 Worms:
* Programs that take advantage of security vulnerability to automatically spread.
 Trojans:
* Exploits, like a trojan horse, without the victim seeing what it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the key takeaways?

A
  • Many organizations are bound by security compliance commitments and will face fines and retribution if they fail to meet these commitments.
  • The use of frameworks and being compliant is not equal to security. Security is a continued process that must be constantly addressed and deeply ingrained in an organization’s culture.
  • Security is about trade-offs- economic and intangible. Firms need to understand their assets and risks to best allocate resources and address needs.
  • Information Security is not simply a technical fix. Education, audit, and enforcement regarding firm policies are critical. Involvement and commitment is essential from the boardroom to frontline workers and out to customers partners.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly