Week 10 Flashcards
What should a good ICT strategy consider about ICT risk?
Must look at risk as well as the advantages of the changes.
– Need for systematic processes to allow risk be
determined
– Need for plans to deal with problems
Fail to prepare - prepare to fail
Why is there an ICT security problem?
Increased convenience for users means increased convenience for people who
should not have access. The price we pay for this is increased security and
management of security.
Information systems are designed to share data and give resources to large amounts of people. networked computers are easier to access than standalone machines also.
What are the three steps to analyse a threat environment and act
Plan, Protect and respond if necessary
Describe how one can plan if they are in a threat enviornment in ICT
We need to consciously assess the risk in order to mitigate it.
Planning Principles:
Risk Analysis
Comprehensive
Security
Defence in depth
Minimum Permissions (dont forget to withdraw permissions)
Describe how one can protect if they are in a threat enviornment in ICT
Better to protect rather than to try to fix things up afterwards.
Involves using access controls, firewalls and crytography to keep people out
Companies spend most of their security effort here daily.
Describe how one can respond if they are in a threat enviornment in ICT
Even with great planning
and protection, incidents
will happen, and a
company must have a well- rehearsed plan for
responding. You can not anticipate everything.
Define malware
– A general name for evil software
– software intentionally designed to cause damage to
a computer, server, client, or computer network
Describe vulnerabilities and how they are dealth with by software providers
Vulnerabilities are security flaws in specific
programs. When vulnerabilities become known, then the software can up updated (patched)
to close off this vulnerability. This is why you have to keep both operating systems
and application software up to date.
What is a zero-day vulnerability
zero-day vulnerability is either unknown to the software vendors or a patch has
not yet been developed. Such vulnerabilities are very dangerous.
When a new zero-day vulnerability is identified a new patch is made available as
soon as possible, out of sequence to the usual update cycle
Whats the difference between vulnerability specific malware and universal malware
Vulnerability-specific malware requires a specific
vulnerability to be effective. ex: idea of climbing in through open window
Universal malware does not require a specific
vulnerability to be effective ex: vs breaking down the door.
Describe and define riskware
Riskware is software that is potentially
dangerous.
Usually offers some benefit at a “cost”
– Compromises security
– Acts illegally Riskware might
– Block another application
– Be used as a backdoor for other malware.
How can riskware be used in marketing
There is a grey area in riskware, where unwelcome advertisements etc may be installed on your computer, but these may not be strictly illegal.
Define social engineering attacks
Tricking the victim into doing something against his or her interests ex: spam phone calls
Define fraud attacks
Lying to the user to get the user to do something
against his or her financial self-interest. IT extends the range of fraud
Define spam attacks
Unsolicited
commercial e-mail. Often fraudulent containing links to websites or malware. Email spam is essentially free to send, so spammers send a million emails in the
hope than a handful of people will respond or click on the link. There are spam blockers but sometimes can block actual email
Define Phishing attacks
Sophisticated social
engineering attacks
with authentic-looking e-
mail or Website.
Wants user to enter
username, password,
and other sensitive
information. Link to website may look real as the text of the link does not need to be the same as the link. Phishers like spammers use mass-mailing and address collection techniques