Test 2 Flashcards
T O F:
It is impossible for organizations to provide perfect security
True
Define Security
can be defined as the degree of protection against criminal activity, danger, damage, or loss.
Define Information Security
all of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction
Define a Threat to an information resource
A threat to an information resource is any danger to which a system may be exposed.
Define the Exposure of an information resource
The exposure of an information resource is the harm, loss, or damage that can result if a threat compromises that resource
Define an information resource’s vulunerability
An information resource’s vulnerability is the possibility that a threat will harm that resource.
What are the 5 Key Facts contributing to the increasing vulnerability of organizational information resources
1.Today’s interconnected, interdependent, wirelessly networked business environment
2.Smaller, faster, cheaper computers and storage devices
3.Decreasing skills necessary to be a computer hacker
4.International organized crime taking over cybercrime
5.Lack of management support
What are the 2 major categories of threats in information security?
The 2 major categories of threats are unintentional threats and deliberate threats.
Unintentional threats are acts performed without malicious intent
Define Social Engineerings
An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information, such as passwords
Types of Social Engineering
Phone Calls- why weren’t u in court?
Physical- hey I’m with IT
Tailgating- following in 320 lol
Soulder Surfing- watch you put password on phone
What are Fishing Attacks?
Phishing Attacks: use deception to acquire sensitive personal information by masquerading as official-looking e-mails, instant messages or te
What are the types of fishing attacks
Spear Phishing Attacks: personalized phishing attacks that target specific individuals or organizations
Whaling Attacks: spear phishing towards high-value individuals to steal sensitive info from companies (usually targeting executives and HR departments)
What are deliberate cyber threats?
Theft of Equipment or Information
What are some examples of deliberate threats
Identity Theft
Compromises to Intellectual Property
Software Attacks
Ransomware
Doxxing
Bots/Denial of Service
What is Malware
MALICIOUS software designed to wreak havoc
Define Ransomware
Blocks access to an individual computer or an organization’s computer system/network
Define Ransomware
Blocks access to an individual computer or an organization’s computer system/network
Define Doxxing
cybercriminals threaten to release the data to the public (private / sensitive customer data).
What is a bot master / bot herder?
Bot Master / Bot Herder- Person Over the Botnet
Bot: Infected Computer
Botnet: A bunch
Alien Software (pestware)
Adware, spyware, Spamware, Keystroke lovers, screen scrapers, stalkerware
What are some examples of alien software
Adware- Ads
Spyware – collects personal information about users without their consent.
Keystroke loggers (keyloggers) = records your keyboard strokes & internet browsing history
Screen scrapers = record a “movie” of screen contents and activities
Stalkerware = powerful surveillance functions which include keylogging, making screenshots, monitoring internet activity, recording location, recording video and
phone calls, and intercepting app (Skype, Facebook, WhatsApp, Snapchat iMessage,etc) communications
What are SCADA attacks
Supervisory control and data acquisition (SCADA) attacks
Important infastructure
Used to monitor or to control chemical, physical, and transport processes – such as those used in oil refineries, water/sewage treatment plants, electrical generators, and power plants.
SCADA systems control equipment (open/close valves, pumps, pressure, flow, voltage, current, etc)
Think Utilities (power/water) or Nuclear Facility cyber attack
What is cyberterrorism
Cyber attacks carried out by individuals or groups
What is cyberwarfare
Cyber attack related to government