TUTORIAL 1 - INTRO TO INFOCOMM SECURITY Flashcards
examples of recent attacks
USB flash drive malware/USB killer
WINVote voting machine tampering
Vtech security breach
stolen data from European Space Agency
IRS fraud
Hyatt Hotels Corporation hacked
reasons for successful attacks
widespread vulnerabilities
configuration issues
poorly designed software
hardware limitations
enterprice-based issues
what are the tasks and goals of information security
tasks of securing info in digital format:
manipulated by microprocessor
preserved on storage device
transmitted over network
goal:
to ensure that protective measures properly implemented to ward off attacks & prevent total collapse of system when attacked
as security ↑, convenience ↓
3 types of info protection (CIA)
confidentiality: only approved individuals may access info
integrity: info is correct & unaltered
availability: info accessible to authorised users
what are the information security layers
products layer
form security around data
Eg. door locks, net sec eq, etc
people layer
those who implement & use sec products to protect data
policies & procedures layer
plans & policies etablished by enterprise to ensure that people crrectly use the products
what are the different types of terminologies
asset
threat
threat actor
vulnerability
threat vector
risk
Identity Theft
what is the definition of the (ATT) terminology
asset: item with value
threat: action that may cause harm
threat actor: person/element who can cause threat ( individuals who launch attacks against other users & their pcs )
what does vulnerability mean
flaw/weakness that allows threat agent to bypass security
what is a threat vector
means which attack can occur
define risk
situation that involves exposure to some danger
what are some risk response techniques
accept: risk acknowledged but no steps taken to address yet
transfer: transfer risk to 3rd party
avoid: identify risk but make decision not to engage in activity
mitigate: address risk by making risk less serious
what is an identity theft
stealing another person’s personal info, usually for financial gain
what are the types of identity theft
steal person’s SSN (social security no.)
create new credit card acc to charge purchases & leave unpaid
file fraudulent tax returns
what importance does information security hold
preventing data theft
thwarting identity theft
avoiding legal consequences of not securing info
maintaining productivity
foiling cyberterrorism
what is preventing data theft
it is the primary objective of an organization’s information security
it involves stealing proprietary
(owned) business information
it also involves stealing credit card numbers