TUTORIAL 1 - INTRO TO INFOCOMM SECURITY Flashcards

1
Q

examples of recent attacks

A

USB flash drive malware/USB killer

WINVote voting machine tampering

Vtech security breach
stolen data from European Space Agency

IRS fraud

Hyatt Hotels Corporation hacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

reasons for successful attacks

A

widespread vulnerabilities

configuration issues

poorly designed software

hardware limitations

enterprice-based issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the tasks and goals of information security

A

tasks of securing info in digital format:

manipulated by microprocessor

preserved on storage device

transmitted over network

goal:

to ensure that protective measures properly implemented to ward off attacks & prevent total collapse of system when attacked
as security ↑, convenience ↓

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 types of info protection (CIA)

A

confidentiality: only approved individuals may access info

integrity: info is correct & unaltered

availability: info accessible to authorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the information security layers

A

products layer

form security around data
Eg. door locks, net sec eq, etc

people layer

those who implement & use sec products to protect data

policies & procedures layer

plans & policies etablished by enterprise to ensure that people crrectly use the products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the different types of terminologies

A

asset
threat
threat actor
vulnerability
threat vector
risk
Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the definition of the (ATT) terminology

A

asset: item with value

threat: action that may cause harm

threat actor: person/element who can cause threat ( individuals who launch attacks against other users & their pcs )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does vulnerability mean

A

flaw/weakness that allows threat agent to bypass security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a threat vector

A

means which attack can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

define risk

A

situation that involves exposure to some danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are some risk response techniques

A

accept: risk acknowledged but no steps taken to address yet

transfer: transfer risk to 3rd party

avoid: identify risk but make decision not to engage in activity

mitigate: address risk by making risk less serious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is an identity theft

A

stealing another person’s personal info, usually for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the types of identity theft

A

steal person’s SSN (social security no.)

create new credit card acc to charge purchases & leave unpaid

file fraudulent tax returns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what importance does information security hold

A

preventing data theft

thwarting identity theft

avoiding legal consequences of not securing info

maintaining productivity

foiling cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is preventing data theft

A

it is the primary objective of an organization’s information security

it involves stealing proprietary
(owned) business information

it also involves stealing credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

examples of avoiding legal consequences through laws protecting electronic data privacy

A

Health Insurance Portability & Accountability Act of 1996 (HIPAA)

Sarbanes-Oxley Act of 2002 (Sarbox)

Gramm-Leach-Billey Act (GLBA)

Payment Card Industry Data Security Standard (PCI DSS)

state notification & security laws
California’s Database Security Breach Notification Act (2003)

17
Q

what are the types of singapore laws for information security

A

data privacy
- personal
data protection act 2012

cybersecurity
- cybersecurity act 2018

cybercrime
- computer misuse act (Cap. 50A)

18
Q

define cyberterrorism

A

any premeditated, politically motivated attack aginst info, pc systems, programs & data

19
Q

what is cyberterrorism designed to do and who may be potential targets

A

cause panic

provoke violence

result in financial catastrophe

banking industry, military installations, power plants, air traffic control centers & water systems

20
Q

what are the different type of attackers

A

threat actor

Script Kiddies

Hacktivists

Nation State Actor

Advanced Persistent Threat

Insiders

21
Q

what are threat actor’s crimes and variations

A

financial cybercrime - divided into 2 categories

1st category focuses on individuals as victims

2nd category focuses on enterprises & gov

they have 4 types of variations:

attributes

funding & resources

whether internal/external to enterprise/org

intent & motivation

22
Q

what are the script kiddies

A

individuals who want to attack computers yet lack the knowledge of computers & network needed to do so

download automated hacking software (scripts) from websites

40% of their attacks require low/no skills

23
Q

what are the hacktivists and what crimes do they commit

A

they attack for ideological reasons generally not as well-defined as cyberterrorist’s motivation

crimes:

breaking into website & changing contents on site to make political statement

disabling website belonging to bank as bank stopped accepting payments deposited into accounts belonging to hactivists

24
Q

what is a nation state actor

A

they are attackers commissioned by govs to attack enemies’ info systems

may target foreign govs/citizens of gov that are considered hostile/threatening
known for being well-resourced & highly trained

25
Q

what is an advanced persistent threat

A

multiyear intrusion campaign that targets highly sensitive economic, proprietary or national security info

26
Q

what are insiders and what crimes do they commit

A

they are usually employees, contractors & business partners

over 58% of breaches attributed to insiders

crimes:

  1. healthcare workers publicise celebrities’ health records

reason:
disgruntled over upcoming job terminations

  1. stock trader conceal losses through fake transactions
    employees

reason:
bribed/coerced into stealing data before moving to new job

27
Q

what are the 5 fundamental ways to defend against attacks

A

Layering

Limiting

Diversity

Obscurity

Simplicity

Frameworks & Reference Architectures

28
Q

what is layering and how can it help defend against attacks

A

instead of using a single defense mechanism that is easy to overcome, layering can make it
unlikely for attackers to break through all defense layers

layered security approach

-provides most comprehensive protection

-useful in resisting variety of attacks

29
Q

what is limiting and how can it help defend against attacks

A

limits access to info and reduce threats against it l

only those who use data be granted access like using file permissions and more procedural documents

30
Q

what is diversity and how can it help defend against attacks

A

closely related to layering

  • more defense layers are used in addition to making each layer diverse

same techniques will be unsuccessful in breaking through other layers

  • requires using security products from diff manufacturers

grps responsible for regulating access (control diversity) are diff

(to prevent attackers from using methods such as brute force)

30
Q

what is obscurity and how can it help defend against attacks

A

making inside details unknown or difficult to know to outsiders

  • like not revealing

type of computer they use

OS version

brand of software used

difficult for attacker to plan or devise attack if system details unknown

31
Q

what is simplicity and how can it help defend against attacks

A

to make security systems easy to understand on the inside but complex from the outside

complex systems are difficult to understand and troubleshoot

32
Q

what are frameworks and reference architectures and how it can help defend against attacks

A

help to provide resources of how to create secure IT environment

overall program structure and guidance to implement & maintain effective security program

various industry-specific frameworks for each particular sector