Week 11 Flashcards

Security for Information Systems

1
Q

Why are Systems Vulnerable?

A
  • System complexity
    – Testing not extensive enough
    – Unanticipated problems
  • Unauthorised access always possible
  • Human error
    – Procedures not always known
    – People couldn’t be bothered with procedures
  • Use wireless even when wired connections available
  • Don’t use virus checkers, etc.
  • Fail to back up data
    – Poor audit means that nobody checks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why has IT spend on security grown?

A

Some of this was driven by more extensive use of IT in the pandemic
- Electronic rather than physical interactions with customers
- Remote working by employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cyber Risk?

A
  • Cyber Risk is the risk of any financial loss,
    disruption or negative reputational impact
    because of a failure in IT systems; whether
    through people, process or technology.
  • risks emanating from the use of electronic data and
    its transmission, including tools such as the
    Internet and telecommunications networks;
  • physical damage caused by cyber-attacks;
  • fraud committed by misuse of data;
  • liability arising from data use, storage and transfer
  • availability, integrity, and confidentiality of
    electronic information – be it related to individuals,
    companies or governments.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Cyber Insurance Cover?

A
  • Covers expenses resulting from
    – Investigation: to determine what occurred, how
    to repair damage and how to prevent the same
    type of breach from occurring again
    – Business losses: network downtime, business
    interruption, data loss recovery etc.
    – Privacy and notification: to customers and other
    affected parties,
    – Lawsuits and extortion: includes legal expenses
    for the release of confidential information, legal
    settlements and fines.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of Cyber Risks

A
  • Business interruption
  • Contingent business interruption
    – caused by related third parties (supplier/customer)
  • Data and software loss
  • Intellectual property theft
  • Network Security/Security
  • Breach of Privacy Compensation
  • Reputational Damage (excluding legal protection)
  • Compensation for crisis management/remediation
    actions requiring internal or external experts
  • Compensation for crisis management/remediation
    actions
  • Cyber ransom and extortion
  • Financial theft and/or fraud
  • Regulatory & Legal Defence costs
  • Incident response costs
    – Cyber ransom and extortion
    – Financial theft and/or fraud
  • Fine and Penalties
  • Communication and media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your cyber insurance cover includes:

A
  • Protection against GDPR non-compliance claims
  • Compensation for income loss due to a data breach
  • Help to recover from reputational damage
  • Forensic investigations to aid data recovery, plus
    legal advice
  • Help notifying regulators after an attack
  • Repair/replacement for damage to equipment
  • Indemnity for supplier losses
  • Consultancy support
  • Liability support if someone alleges you’ve
    transmitted a virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyber First Aid

A
  • Wi-fi
    – Change default router password
    – Don’t use public wifi without vpn
  • Passwords
    – Secure devices with passwords, pins, biometrics
    – Use encryption and two factor authentication
  • Back up data
    – Check the back-ups work!
  • Use antivirus software
  • Review app permission
  • Keep personal and work data separate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Belt and Braces Control of Security Planning Principles

A

Management Control
Each department manage their own controls affecting people, processes and
technology.
Risk Management
Centralised control of the enterprise, including compliance, legal, quality control
and financial control.

Internal Audit
Third force that checks the adequacy of the controls in place. This might include
some external assistance from experts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Minimum Permissions

A
  • Minimum Permissions
    – Access control is limiting who can use resources
    AND limiting their permissions
    – Permissions are what they are allowed do
    – People should be given minimum permissions
  • the least they need to do their jobs
  • so that they cannot do unauthorised things
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Controls

A
  • Physical protection
    – Restricted physical
    access
    – Locks
    – Barriers
    – Security chains
  • Software controls
    – Passwords
    – Disk encryption
    – IP/location restriction
  • Biometric controls
    – Individuals’ unique
    characteristics
    – Fingerprints
    – Voice prints
    – Retinal patterns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reusable Passwords

A

– Strings of characters typed to authenticate the use
of a username (account) on a computer.
– They are used repeatedly and so are called
reusable passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Major Incident Response

A
  • Major incidents are incidents the on-duty security
    staff cannot handle.
  • Company must convene a computer security
    incident response team (CSIRT).
  • CSIRTs should include
    – members of senior management,
    – the firm’s security staff,
    – members of the IT staff,
    – members of affected functional departments
    – firm’s public relations and legal departments.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Managing Internet Threats

A
  • Use of firewalls
    – Prevent unauthorised access to company’s system
    at point of connection to internet
  • Adopt procedures for internet usage
  • Establish protocol for incoming mail
  • Keep all virus checkers and OS software up to
    date
  • Harden new machines before connecting to
    Internet
    – Install the virus checker first, then other software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly