Week 7 Flashcards

1
Q

What is IT Security?

A

The protection of computer systems and networks from the theft of or damage to their hardware, software or electronic data, as well as from the disruption or misdirection of services they provide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the security triad?

A

C I A - Important about an information system is that it is available, confidential and integer.

  • Available (system needs to be available for use)
  • Confidential (Data in a system needs to be confidential)
  • Integrity (Software on a server needs to do what it is supposed to do)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is security important?

A
  • Brand image - customer loyalty and trust
  • Staying compliant to the law
  • Everything is connected to the internet nowadays (easier to hack)
  • If IS is damaged, the whole organization is damaged.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are direct effects of security failure?

A
  • computer outages

- operation disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are indirect effects of security failures?

A
  • legal problems

- image problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is security not an IT problem?

A
  • IT security affects organizational security;
  • IT security needs managerial decision making
  • Security is a negative deliverable
  • Security is diffuclt to fund’
  • A manager needs to make the trade-off to spend more on security or face higher risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is meant by security is a negative deliverable?

A

It produces no revenue and makes IT less efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is security difficult to fund?

A
  • IT departments have limited funds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are recent developments in security?

A
  • GDPR
  • Mobile malware
  • Non protected IoT devices
  • Nations engaging in cyber warfare and espionage
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are internal IT security threats?

A
  • Intentional malicious behaviour

- Careless behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

-What are external IT security threats?

A
  • Intrusion threats
  • Social engineering
  • Phishing
  • Security weaknesses
  • Backdoors
  • Malicious code
  • Denial of service attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by intrusion threat?

A

An unauthorized attacker gains access to IT resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is meant by social engineering?

A

Lying to and deceiving legitimate users to get restricted or private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phishing?

A

Kind of social engineering. Asking to confirm personal data to actually acquire it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are security weaknesses?

A

Bugs that enable unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are backdoors?

A

Code specifically designed to grant access to unauthorized users to access an application

17
Q

What are forms of malicious code?

A

Any software designed to cause damage to IT assets

  • Virus
  • Trojan Horse
  • Worms
  • Spyware
  • Ransomware
18
Q

What is a virus?

A

Performs a payload -> harmful set of actions

Spreads by attaching itself to legitimate software

19
Q

What is a trojan horse

A

Program that claims to be legitimate but delivers a hidden payload

20
Q

What is a worm

A

Malicious code to networking software that generates a lot of traffic on the network

21
Q

What is a denial of service attack?

A

Digital assault by overwhelming an online service with traffic to force it offline
-> can be used to create a backdoor for later

22
Q

How can you limit security threats (main focus internal)?

A
  • Security policies including:
  • Password standards
  • user rights
  • Legimitate use of portable devices
    AUDIT POLICIES

-> Authentication and acces control

23
Q

How can you limit external security threats?

A
  • Use of passwords
  • Firewalls
  • Encryption (public/private)
  • Backups
24
Q

What is a DMZ?

A
  • Demilitarized zone in a server. It is after the first firewall and systems are stored here that are accessed by the public. More private servers are stored behind more firewalls
25
Q

What can you do against malware?

A
  • Detection software

- Train employees

26
Q

What can you do agains a denial of service attack?

A
  • Preventing of DOS is difficult because they use slave computers;
  • Difficult to identify the location of attack
  • Shut down your system or part of your system
  • Make use of national and international security communities.
27
Q

What is IT Risk Management?

A

Process of identifying and measuring information system security risks. Goal is to develop the best risk mitigation strategy.

28
Q

What are the three steps in IT Risk Management?

A
  • Risk Assesment
  • Risk Analysis
  • Risk Mitigation
29
Q

What is risk assesment?

A

First step in risk management.

-> Audit current resources, expose vulnerabilities

30
Q

What is Risk Analysis?

A

Quantifying the risks that are identified.

Look at: hazards, exposure and vulnerability

31
Q

What are hazards?

A

Events that can happen that poses a potential risk

32
Q

What is exposure?

A

What resources can be affectd by hazards?

33
Q

What is vulnerability?

A

How can the organization deal with the risk / what is the likelihood that it happens?

34
Q

What are risk mitigation strategies?

A
  • Risk Acceptance (don’t do anything)
  • Risk Reduction (spend some, less risks)
  • Risk transference (passing it on to a third party)
35
Q

What is the crisis response cycle?

A

Crisis -> Response -> Recovery -> Mitigation -> Preparedness