TUTORIAL 1 - INTRO TO INFOCOMM SECURITY Flashcards

1
Q

examples of recent attacks

A

USB flash drive malware/USB killer

WINVote voting machine tampering

Vtech security breach
stolen data from European Space Agency

IRS fraud

Hyatt Hotels Corporation hacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

reasons for successful attacks

A

widespread vulnerabilities

configuration issues

poorly designed software

hardware limitations

enterprice-based issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the tasks and goals of information security

A

tasks of securing info in digital format:

manipulated by microprocessor

preserved on storage device

transmitted over network

goal:

to ensure that protective measures properly implemented to ward off attacks & prevent total collapse of system when attacked
as security ↑, convenience ↓

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 types of info protection (CIA)

A

confidentiality: only approved individuals may access info

integrity: info is correct & unaltered

availability: info accessible to authorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the information security layers

A

products layer

form security around data
Eg. door locks, net sec eq, etc

people layer

those who implement & use sec products to protect data

policies & procedures layer

plans & policies etablished by enterprise to ensure that people crrectly use the products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the different types of terminologies

A

asset
threat
threat actor
vulnerability
threat vector
risk
Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the definition of the (ATT) terminology

A

asset: item with value

threat: action that may cause harm

threat actor: person/element who can cause threat ( individuals who launch attacks against other users & their pcs )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does vulnerability mean

A

flaw/weakness that allows threat agent to bypass security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a threat vector

A

means which attack can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

define risk

A

situation that involves exposure to some danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are some risk response techniques

A

accept: risk acknowledged but no steps taken to address yet

transfer: transfer risk to 3rd party

avoid: identify risk but make decision not to engage in activity

mitigate: address risk by making risk less serious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is an identity theft

A

stealing another person’s personal info, usually for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the types of identity theft

A

steal person’s SSN (social security no.)

create new credit card acc to charge purchases & leave unpaid

file fraudulent tax returns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what importance does information security hold

A

preventing data theft

thwarting identity theft

avoiding legal consequences of not securing info

maintaining productivity

foiling cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is preventing data theft

A

it is the primary objective of an organization’s information security

it involves stealing proprietary
(owned) business information

it also involves stealing credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

examples of avoiding legal consequences through laws protecting electronic data privacy

A

Health Insurance Portability & Accountability Act of 1996 (HIPAA)

Sarbanes-Oxley Act of 2002 (Sarbox)

Gramm-Leach-Billey Act (GLBA)

Payment Card Industry Data Security Standard (PCI DSS)

state notification & security laws
California’s Database Security Breach Notification Act (2003)

17
Q

what are the types of singapore laws for information security

A

data privacy
- personal
data protection act 2012

cybersecurity
- cybersecurity act 2018

cybercrime
- computer misuse act (Cap. 50A)

18
Q

define cyberterrorism

A

any premeditated, politically motivated attack aginst info, pc systems, programs & data

19
Q

what is cyberterrorism designed to do and who may be potential targets

A

cause panic

provoke violence

result in financial catastrophe

banking industry, military installations, power plants, air traffic control centers & water systems

20
Q

what are the different type of attackers

A

threat actor

Script Kiddies

Hacktivists

Nation State Actor

Advanced Persistent Threat

Insiders

21
Q

what are threat actor’s crimes and variations

A

financial cybercrime - divided into 2 categories

1st category focuses on individuals as victims

2nd category focuses on enterprises & gov

they have 4 types of variations:

attributes

funding & resources

whether internal/external to enterprise/org

intent & motivation

22
Q

what are the script kiddies

A

individuals who want to attack computers yet lack the knowledge of computers & network needed to do so

download automated hacking software (scripts) from websites

40% of their attacks require low/no skills

23
Q

what are the hacktivists and what crimes do they commit

A

they attack for ideological reasons generally not as well-defined as cyberterrorist’s motivation

crimes:

breaking into website & changing contents on site to make political statement

disabling website belonging to bank as bank stopped accepting payments deposited into accounts belonging to hactivists

24
Q

what is a nation state actor

A

they are attackers commissioned by govs to attack enemies’ info systems

may target foreign govs/citizens of gov that are considered hostile/threatening
known for being well-resourced & highly trained

25
what is an advanced persistent threat
multiyear intrusion campaign that targets highly sensitive economic, proprietary or national security info
26
what are insiders and what crimes do they commit
they are usually employees, contractors & business partners over 58% of breaches attributed to insiders crimes: 1. healthcare workers publicise celebrities' health records reason: disgruntled over upcoming job terminations 2. stock trader conceal losses through fake transactions employees reason: bribed/coerced into stealing data before moving to new job
27
what are the 5 fundamental ways to defend against attacks
Layering Limiting Diversity Obscurity Simplicity Frameworks & Reference Architectures
28
what is layering and how can it help defend against attacks
instead of using a single defense mechanism that is easy to overcome, layering can make it unlikely for attackers to break through all defense layers layered security approach -provides most comprehensive protection -useful in resisting variety of attacks
29
what is limiting and how can it help defend against attacks
limits access to info and reduce threats against it l only those who use data be granted access like using file permissions and more procedural documents
30
what is diversity and how can it help defend against attacks
closely related to layering - more defense layers are used in addition to making each layer diverse same techniques will be unsuccessful in breaking through other layers - requires using security products from diff manufacturers grps responsible for regulating access (control diversity) are diff (to prevent attackers from using methods such as brute force)
30
what is obscurity and how can it help defend against attacks
making inside details unknown or difficult to know to outsiders - like not revealing type of computer they use OS version brand of software used difficult for attacker to plan or devise attack if system details unknown
31
what is simplicity and how can it help defend against attacks
to make security systems easy to understand on the inside but complex from the outside complex systems are difficult to understand and troubleshoot
32
what are frameworks and reference architectures and how it can help defend against attacks
help to provide resources of how to create secure IT environment overall program structure and guidance to implement & maintain effective security program various industry-specific frameworks for each particular sector