Session 5 - How to deal with IT issues ? Flashcards

1
Q

Security issues

A
  • Indiscretions: violation of confidentiality
  • Thief: Data and money (ex: banques)
  • Degradation: integrity of the data
    • Sabotage (ex : site web sabotés, passwords, adresses, téléphones dévoilés)
    • Breakdown

Guerre entre pays au niveau informatique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security threats (les niveaux)

A

Niveaux

  1. Au niveau du client : hacker le client, parfois fausses données entrées simplement sabotent système, spywares, virus
  2. Pirate intercepte message, le changer. Radiation : même pas besoin d’être connecté au net car l’ordi a une signature thermique => on connaît l’affichage
  3. Seveurs : attaque depuis l’extérieur
  4. Corporate systems : attaque depuis l’intérieur du système
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security threats (techniques)

A
  • Sniffing : Wifi d’aéroport, free-wifi, sans password super dangereux. Borne internet peut capter tous les passwords et tout.
  • Tapping : intercepter conversation téléphonique, très facile
  • Worms : blaster, iloveyou, par outlook, envoie message à tout le carnet d’adresses. Pas besoin d’ouvrir le message, simplement le sélectionner.
  • Phishing : Faux emails d’une entreprise, paypal, etc. Vérifier que les liens hypertextes sont bien ceux qu’ils disent être en passant la souris dessus.
  • Identity theft : quelqu’un vole carte d’identité, photo change mais infos restent les mêmes
  • DDoS : Quelqu’un infecte des machines « esclaves » qui sont forcées d’envoyer de l’information en volume à la cible. Pour faire crasher la cible. Corée du Sud grande victime car beaucoup de connexions.
  • Trojan horse: infected file that looks legitimate, but contains a virus or another type of malicious software.
  • Spyware: software downloaded and installed on computer without user’s knowledge. Monitors user’s activities and reports them to somewhere.
    *
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attackers

A
  • Jokers (script kiddies): having fun!
  • Vandal (crackers): want to destroy things
  • Competitor (hackers): like challenges
  • Spy for government or companies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network security

A
  • Network firewall / router: control information between internal and external network, core of security system
  • WEP / WPA / WPA2: wifi encryption
  • Web filter and proxy: relay request between client and server
  • Anti-spam filter: allows to limit undesired messages
  • Anti-virus filter: detect and eliminate viruses
  • Anti-spyware software: detect + eliminate
  • Encryption software: encrypt files unless password
  • Password management software
  • System backup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

5 principes de la sécurité d’information

A

Confidentialité: information can only be read by authorized persons

  • Encryption
  • Public key encryption
  • Web-security SSL: https
  • Anti-spyware

Intégrité: information is reliable and has not been damaged

  • Anti-virus

Availibility: information is available

  • Business continuity (Google data center)
    • Faut-tolerant computer systems
    • Load balancing: distribute access requests across multiple servers
    • Mirroring: backup server that duplicates processes on primary server
    • Disaster recovery planning: Plans for restoration of computing if flood, earthquake…
  • Local backup (disque dur externe)
  • Online backup (dropbox)
  • Against computer thefts
  • Anti-theft software (prey)

Access control: information is protected against access without authorization

  • Firewall, proxy, filter
  • Passwords, etc.

Non-repudation: creation of a proof that a transaction has been conducted

  • Digital signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly