Week 11 Flashcards

1
Q

Why do we need security and controls for Information systems?

A

IS share data and provide resources to lots of people including those who shouldn’t have access. Controls upon information systems are based upon two underlying principles:
– The need to ensure accuracy of data
– The need to protect against loss or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are systems vulnerable?

A

System complexity –Testing not extensive enough

Unauthorised access is always possible

Human error – People couldn’t be bothered with procedures - a system programmed to do checks will do all the time whereas sometimes people won’t. Don’t use virus checkers, etc., Fail to backup data

Poor audit means that nobody checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biggest Cyber threats in 2024

A

Cloud-related threats
Ransomware
Third-party breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How might small companies deal with network security management

A

Outsourcing or using cloud software may be safer as this is giving responsibility to specialists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats the trend of % of IT spend on security? Why is this trend in place for IT spending?

A

IT spend on security is growing
Recent growth was driven by more extensive use of IT in the pandemic
- Electronic rather than physical interactions with customers
- Remote working by employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give examples/ statistics of cybercrime in Ireland

A

HSE Attack
Cybercrime ≈ €10 Billion in 2022
Garda cybercrime division tripled in size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define cyber risk

A

Cyber Risk is the risk of any financial loss, disruption or negative reputational impact because of a failure in IT systems; whether through people, process or technology.
* risks emanating from the use of electronic data and its transmission, including tools such as the Internet
* physical damage caused by cyber-attacks;
* fraud committed by misuse of data;
* liability arising from data use, storage and transfer
* availability, integrity, and confidentiality of electronic information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give examples of specific cyber risks

A
  • Business interruption
  • Data and software loss
  • Intellectual property theft
  • Network Security/Security
  • Breach of Privacy Compensation
  • Reputational Damage (excluding legal protection)
  • Compensation for crisis management/remediation actions requiring internal or external experts
  • Cyber ransom and extortion
  • Fine and Penalties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain how to insure against cyber attacks

A

Most cyber-attacks are not covered by standard insurance policies, even though Cybercrime is the fastest growing criminal act in the world. But you can take out cyber insurance. However direct costs can be very considerable even with insurance and reputational damage is substantial. You can be held liable for third party data such a customer data or credit card data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What expenses does cyber insurance cover?

A

– Investigation: to determine what occurred, how to repair damage and how to prevent the same type of breach from occurring again
– Business losses: network downtime, business interruption, data loss recovery, repair/replace damaged equipment etc.
– Privacy and notification: to customers and other affected parties,
– Lawsuits and extortion: includes legal expenses for the release of confidential information, legal settlements and fines
Includes expert help in some cases - legal help consultancy support, liability support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is cyberinsurance not a mature market?

A

People are uncertain what the risks are and how to price the insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some simple measures everyone should do - cyber first aid

A
  • Wi-fi: Change default router password, Don’t use public wifi without vpn
  • Passwords: Secure devices with passwords, pins, biometrics, Use encryption and two factor authentication
  • Back up data: Check the back ups work!
  • Use antivirus software
  • Review app permission
  • Keep personal and work data separate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are security planning principles

A

Risk analysis - balancing threat and protection costs for assets, goal is to reduce risk to an economically rational level.
Comprehensive security - close off all avenues of attack
Defence in depth - attacker should have to break through several lines of defence to succeed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define internal audit

A

Internal Audit
Third force that checks the adequacy of the controls in place. This might include some external assistance from experts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain risk management department

A

Centralised control of the enterprise, including compliance, legal, quality control and financial control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the key principle of security planning

A

Minimum permissions : access control is limiting who can use resources and limiting their permissions to the minimum required to do their job but also so they cannot do unauthorised things

17
Q

How do you reduce exposure to security threats

A
  • Containment – Controlling access to an information system
  • Deterrence – Threat of punishment to discourage potential intruders
  • Obfuscation – Hiding or distributing assets to limit damage
  • Recovery – Ensuring normal operation resumes as quickly as possible with as little disruption as possible
18
Q

What are some other control techniques - some of which do not prevent problems but allow you to recover form them.

A
  • User Validation or Access Controls
  • Back-up Procedures
  • Auditing – Regular stock-take of procedures, hardware,
    software and data
19
Q

What are the different categories of controls

A

Physical protection
Software controls
Biometric controls - ex individuals unique characteristics

20
Q

What’s an important control measure when physical parts are disposed of

A

Ensure data is deleted/destroyed

21
Q

Explain access control

A

Controlling access to resources so only the right people get access
Authentication involves supplicant sending credentials to verifier proving its identity from a distance

22
Q

What is password authentication and the benefits

A

Reusable Passwords
– Strings of characters typed to authenticate the use of a username (account) on a computer.
– They are used repeatedly and so are called reusable passwords.
Benefits
– Ease of use for users (familiar)
– Inexpensive because built into operating systems

23
Q

Why are passwords often guessed/ reason for concern? How can protection be enhanced

A

People use weak and easily guessed passwords
Constant password changes enhance protection, but people cannot remember them.
Word and name passwords are never adequately strong.- need to be complex and long which can cause problems as people often tend to write them down.

24
Q

How does the speed of computers influence passwords

A

Faster computers make it easier to break passwords so we need longer more complex passwords than would have sufficed in the past.

25
Q

What is 2 factor authentication

A

Adds another layer other than just the traditional password
Ex: Text your phone when you change PW
Phone app verification

26
Q

What are some other forms of authentication other than password

A

Access cards
Biometrics - uses body measurements
ex: fingerprint scanning, iris scanning, facial scanning

27
Q

Bring your own device - What are the issues with this?

A

Data theft, malware, lost or stolen devices, Improper mobile management, Insufficient employee training, shadow IT

28
Q

Explain the UCD networks and firewalls

A

UCD wireless firewall is quite restrictive, UCD Eduroam wireless has fewer
restrictions and UCD staff wired network less again, because in the latter cases there is a record of who is generating the traffic

29
Q

Explain how does a firewall work

A

A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.

30
Q

What is cryptography give an example fo its application IT security

A

The art of writing or solving codes. Ex: Message integrity - can tell if message has been altered on route

31
Q

What are the stages of responding to an attack

A

– Detecting the attack
– Stopping the attack
– Repairing the damage
– Punishing the attacker?

32
Q

What is key to incident response

A

Response should be in line with a plans. You need a plan when you have time to think about it, and then merely modify it when there is an actual attack.

33
Q

What classifies a major incident response

A

Major incidents are incidents the on-duty security staff cannot handle.
Company must convene a computer security incident response team (CSIRT)
A major IT problem is not only a technical issue, it needs a response from the
entire organisation.

34
Q

What does IT disaster recovery usually consist of

A

Dedicated backup sites and transferring personnel
or
Having two sites mutually back up each other

35
Q

What does business continuity recovery involve

A

Business continuity recovery
– Getting the whole firm back into operation
– IT is only one concern

36
Q

Why are rehearsals for incident response necessary

A

Serious incidents are infrequent, fortunately. However, you need to rehearse or simulate the event in advance to make sure that your continuity arrangements work.

37
Q

What are some recent IT threats to be aware of as an individual

A
  • Password-stealing Web sites will increase
  • Hackers will target video files
  • Mobile phone attacks will become more prevalent
  • Identity theft and data loss will continue to be a
    public issue
  • More Adware
  • Ransomware
38
Q

How to manage internet threats

A
  • Use of firewalls
  • Adopt procedures for internet usage
  • Establish a protocol for incoming mail
  • Keep all virus checkers and OS software up to
    date
  • Harden new machines before connecting to
    Internet
39
Q

What problems digital money presents and how to overcome it?

A

Digital information has the following property - easy to duplicate and could copy digital money and double spend it
To a solve double-spending - using a peer to peer network, a public ledger using blockchain data structure will also protect