Week 10 Flashcards

1
Q

What should a good ICT strategy consider about ICT risk?

A

Must look at risk as well as the advantages of the changes.
– Need for systematic processes to allow risk be
determined
– Need for plans to deal with problems
Fail to prepare - prepare to fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is there an ICT security problem?

A

Increased convenience for users means increased convenience for people who
should not have access. The price we pay for this is increased security and
management of security.
Information systems are designed to share data and give resources to large amounts of people. networked computers are easier to access than standalone machines also.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three steps to analyse a threat environment and act

A

Plan, Protect and respond if necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe how one can plan if they are in a threat enviornment in ICT

A

We need to consciously assess the risk in order to mitigate it.

Planning Principles:
Risk Analysis
Comprehensive
Security
Defence in depth
Minimum Permissions (dont forget to withdraw permissions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe how one can protect if they are in a threat enviornment in ICT

A

Better to protect rather than to try to fix things up afterwards.
Involves using access controls, firewalls and crytography to keep people out
Companies spend most of their security effort here daily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe how one can respond if they are in a threat enviornment in ICT

A

Even with great planning
and protection, incidents
will happen, and a
company must have a well- rehearsed plan for
responding. You can not anticipate everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define malware

A

– A general name for evil software
– software intentionally designed to cause damage to
a computer, server, client, or computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe vulnerabilities and how they are dealth with by software providers

A

Vulnerabilities are security flaws in specific
programs. When vulnerabilities become known, then the software can up updated (patched)
to close off this vulnerability. This is why you have to keep both operating systems
and application software up to date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a zero-day vulnerability

A

zero-day vulnerability is either unknown to the software vendors or a patch has
not yet been developed. Such vulnerabilities are very dangerous.
When a new zero-day vulnerability is identified a new patch is made available as
soon as possible, out of sequence to the usual update cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whats the difference between vulnerability specific malware and universal malware

A

Vulnerability-specific malware requires a specific
vulnerability to be effective. ex: idea of climbing in through open window
Universal malware does not require a specific
vulnerability to be effective ex: vs breaking down the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe and define riskware

A

Riskware is software that is potentially
dangerous.
Usually offers some benefit at a “cost”
– Compromises security
– Acts illegally Riskware might
– Block another application
– Be used as a backdoor for other malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can riskware be used in marketing

A

There is a grey area in riskware, where unwelcome advertisements etc may be installed on your computer, but these may not be strictly illegal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define social engineering attacks

A

Tricking the victim into doing something against his or her interests ex: spam phone calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define fraud attacks

A

Lying to the user to get the user to do something
against his or her financial self-interest. IT extends the range of fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define spam attacks

A

Unsolicited
commercial e-mail. Often fraudulent containing links to websites or malware. Email spam is essentially free to send, so spammers send a million emails in the
hope than a handful of people will respond or click on the link. There are spam blockers but sometimes can block actual email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Phishing attacks

A

Sophisticated social
engineering attacks
with authentic-looking e-
mail or Website.
Wants user to enter
username, password,
and other sensitive
information. Link to website may look real as the text of the link does not need to be the same as the link. Phishers like spammers use mass-mailing and address collection techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What types of businesses are the biggest phishing targets?

A

Financial Institutions and cryptocurrency are an obvious target.
Email and social media sites provide a lot of information of use to criminals. and Payments sites

18
Q

What are the traits of a phishing email?

A
  1. The email is designed to sound serious.
    ‘urgent action required’
  2. Poor spelling and grammar.
  3. A mismatched or dodgy URL.
    The embedded link is not the same as the apparent link.
  4. You are asked for sensitive information.
19
Q

Why is SMS not as popular for spam or phishing?

A

Because it costs more and In SMS texts you cannot conceal a different URL behind text, so a fake URL
should be more obvious.

20
Q

Define credit card theft online?

A

Credit Card Number Theft
– Performed by “carders”
– Make purchases with stolen credit card or steal from online account

21
Q

Define identity theft online

A

– Collecting enough data to impersonate
the victim in large financial transactions
– May take a long time to restore the victim’s credit
rating
- Cane involved someone opening an account in your name without you knowing

22
Q

Define corporate identity theft

A

In corporate identity theft, the attacker
impersonates an entire corporation
- Allow you order big quantities of goods etc on 30 days credit
- A lot of information about the company is public

23
Q

Define vandalism and types of theft one can face in ICT

A

Vandalism/Sabotage:
– Deliberate damage to hardware, software and/or data, including companies’ websites
ICT can also mean: Physical theft – stealing hardware and software,
Data theft – stealing sensitive information or
making unauthorised changes to computer records

24
Q

Why are disgruntled employees and en-employees dangerous

A

– Extensive access to systems, with privileges
– Knowledge about how systems work
– Knowledge about how to avoid detection
Business need to immediately withdraw network access if they dispense with the
services of an employee.

25
Q

What isnider threats do a business face?

A

Insider threats
– Unauthorised disclosure of sensitive information ex: AOLs 2005 jason smathers
– Process corruption
– Facilitation of third-party access to an organisation
– Physical sabotage
– Electronic or IT sabotage

26
Q

What are common deliberate indvidual sabotage methods

A

Logic Bomb– Destructive computer program that activates at a
certain time or in reaction to a specific event
Back door – Section of program code that allows a user to circumvent security procedures and gain full access
to the system
Physical damage – Literally wreck the system

27
Q

Define Hacking

A

Intentionally using a computers resources without authorisation or in excess of authorisation. Hackers were traditionally nerds doing it for the thrill of showing how smart they
are, now they usually just do it for the money, the tech people renting their services to criminal gangs.

28
Q

Is it a crime to write malware

A

Not usually but its a crime to release it.

29
Q

Give an example of a mega data breach

A

Yahoo 2014 500m accounts compromised

30
Q

Explain the business of cirminal Attackers and hackers

A

Crime generates funds that criminal hackers need
to increase attack sophistication.
Large and complex black markets for:
– attack programs,
– attacks-for-hire services,
– bot rentals and sales, money laundering,
Black market is accessible through the use of Tor and bitcoins
Criminal types pay for the software to break into networks etc and then sell the
data on the dark web

31
Q

Define ransomeware

A

Ransomware became one of the most common
forms of malware (half of all companies reported
it), but has declined in 2018. It works by
– Infecting your operating system
– Encrypting all your data
– Displays message Demanding you pay a ransom in a digital currency, to get system to work again
– Typically you have 24 hours to pay

Cane be installed through a deceptive link in an email or website

32
Q

What businesses report ransomware attacks the msot?

A

Manufacturing, business services, retail, healthcare.
Often doen where there are machines which have old hardware associated with them. Easier to hack an out of date computer.

33
Q

Give an example of a ransomware attack

A

HSE May 2021

34
Q

Describe the ransomware sequence of events

A
  • Distribution Campaign : phishing emails and
    websites.
  • Malicious Code Infection : The dropper
    downloads an executable to install ransomware
  • Malicious Payload Staging ransomware
    embeds itself in the system.
  • Scanning : ransomware finds content to encrypt.
  • Encryption Files and folder are encrypted
  • Payday : A ransom note with instructions on how
    to pay the ransom.
35
Q

Define DoS attacks

A

Denial of Service attacks - Intalling bots in devices. ex: can be done through IoT. Internet of Things (IOT) create a large number of simple devices connected to the
Internet. These can be hijacked to create flows of network traffic to targets of DOS
attacks.

36
Q

Describe when IT sabotage may be ued by terrosits

A

Cyberattacks by cyberterrorists
– Cyberattacks on utilities grids
– Financial disruption
Governments potentially have large resources to devote to IT sabotage and it may be cheaper than developing state of the art missiles and aircraft. EX: US accuses Russia of tampering with election

37
Q

What is Stunext

A

Stuxnet, the first known malware worm designed
to disrupt industrial processes.
Stuxnet seeks out and silently hijacks factory
control software written by Siemens for uranium-
enriching centrifuges. It infects the computers running that software, it can command
uranium-enriching centrifuges to spin out of control, thereby destroying them

38
Q

Based on microsofts security intelligence report what is the most frequent cause of problems with ICT security

A

– Malicious sabotage incidents accounted for less
than 50% of the total incidents that occur.
– Lost, stolen and missing equipment is often the
most frequent access point.
– Accidental disclosure via the web
– Improper disposal of records is also quite frequent.
Incompetence is the most frequent cause of problems not maliciious activity

39
Q

What does a business need to avoid accidents with IT

A

You need
* clear policies on doing things right
* ensure that these policies are actually followed
* systems that cannot be easily damaged by a single mistake
* E.g. require two steps or two people to shut down everything

40
Q

How much does Incompetence account for crashing in IS?

A

40-65% of damage to information systems arises from human error

41
Q

Give an example of risks of device theft/loss

A

People can lose devices which can be sold for alot of money
BYOD to work means user devices connect ot corporate networks - phone commmon
Portable devices present intrinsic security problems.
With online banking, Google Pay etc, losing your phone presents a lot of risks to
the individual.

42
Q

What are the four big reasons why IS systems are vulnerable?

A

Never underestimate human error.
Many computer crimes are old fashioned crime now being pursued in different
ways, theft, fraud etc.
Invasion of privacy results from the ability of IT to collate large amounts of
information and make it available throughout the world.
Physical problems