Week 7 Flashcards
What is IT Security?
The protection of computer systems and networks from the theft of or damage to their hardware, software or electronic data, as well as from the disruption or misdirection of services they provide.
What is the security triad?
C I A - Important about an information system is that it is available, confidential and integer.
- Available (system needs to be available for use)
- Confidential (Data in a system needs to be confidential)
- Integrity (Software on a server needs to do what it is supposed to do)
Why is security important?
- Brand image - customer loyalty and trust
- Staying compliant to the law
- Everything is connected to the internet nowadays (easier to hack)
- If IS is damaged, the whole organization is damaged.
What are direct effects of security failure?
- computer outages
- operation disruptions
What are indirect effects of security failures?
- legal problems
- image problems
Why is security not an IT problem?
- IT security affects organizational security;
- IT security needs managerial decision making
- Security is a negative deliverable
- Security is diffuclt to fund’
- A manager needs to make the trade-off to spend more on security or face higher risk
What is meant by security is a negative deliverable?
It produces no revenue and makes IT less efficient
Why is security difficult to fund?
- IT departments have limited funds
What are recent developments in security?
- GDPR
- Mobile malware
- Non protected IoT devices
- Nations engaging in cyber warfare and espionage
- Social engineering
What are internal IT security threats?
- Intentional malicious behaviour
- Careless behaviour
-What are external IT security threats?
- Intrusion threats
- Social engineering
- Phishing
- Security weaknesses
- Backdoors
- Malicious code
- Denial of service attack
What is meant by intrusion threat?
An unauthorized attacker gains access to IT resources
What is meant by social engineering?
Lying to and deceiving legitimate users to get restricted or private information
What is phishing?
Kind of social engineering. Asking to confirm personal data to actually acquire it.
What are security weaknesses?
Bugs that enable unauthorized access