2 - The Need for Security

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/120

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:14 AM on 2/7/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

121 Terms

1
New cards

Information security

is a management issue

2
New cards

Information security

is a people issue

3
New cards

Communities of interest

must argue for information security in terms of impact and cost

4
New cards

Enabling Safe Operation

Organizations must create integrated, efficient, and capable applications

5
New cards

Enabling Safe Operation

Organization need environments that safeguard applications

6
New cards

Enabling Safe Operation

Management must not abdicate to the IT department its responsibility to make choices and enforce decisions

7
New cards

Organizations

-- must create integrated, efficient, and capable applications

8
New cards

data

One of the most valuable assets is --

9
New cards

data

Without --, an organization loses its record of transactions and/or its ability to deliver value to its customers

10
New cards

information security program

An effective -- is essential to the protection of the integrity and value of the organization's data

11
New cards

Protecting Data

An effective information security program is essential to the protection of the integrity and value of the organization's data

12
New cards

Safeguarding Technology Assets

Organizations must have secure infrastructure services based on the size and scope of the enterprise

13
New cards

Safeguarding Technology Assets

Additional security services may have to be provided

14
New cards

Safeguarding Technology Assets

More robust solutions may be needed to replace security programs the organization has outgrown

15
New cards

threats

Management must be informed of the various kinds of -- facing the organization

16
New cards

threat

is an object, person, or other entity that represents a constant danger to an asset

17
New cards

threat

By examining each -- category in turn, management effectively protects its information through policy, education and training, and technology controls

18
New cards

Acts of Human Error or Failures

Includes acts done without malicious intent

19
New cards

Acts of Human Error or Failures

Caused by:

Inexperience

Improper training

Incorrect assumptions

Other circumstances

20
New cards

Employees

are greatest threats to information security - They are closest to the organizational data

21
New cards

controls

Many of these threats can be prevented with --

22
New cards

Loss of Internet service

-- can lead to considerable loss in the availability of information

23
New cards

outsourcer

When an organization outsources its web servers, the -- assumes responsibility for All Internet Services and The hardware and operating system software used to operate the web site

24
New cards

Power Irregularities

Voltage levels can increase, decrease, or cease

25
New cards

spike

momentary increase

26
New cards

surge

prolonged increase

27
New cards

sag

momentary low voltage

28
New cards

brownout

prolonged drop

29
New cards

fault

momentary loss of power

30
New cards

blackout

prolonged loss

31
New cards

Electronic equipment

is susceptible to fluctuations, controls can be applied to manage power quality

32
New cards

Espionage or Trespass

Broad category of activities that breach confidentiality

33
New cards

Shoulder surfing

can occur any place a person is accessing confidential information

34
New cards

Hackers

uses skill, guile, or fraud to steal the property of someone else

35
New cards

Expert hacker

develops software scripts and codes exploits

36
New cards

Expert hacker

usually, a master of many skills

37
New cards

Expert hacker

will often create attack software and share with others

38
New cards

Script kiddies

hackers of limited skill

39
New cards

Script kiddies

use expert-written software to exploit a system

40
New cards

Script kiddies

do not usually fully understand the systems they hack

41
New cards

Cracker

an individual who "cracks" or removes protection designed to prevent unauthorized duplication

42
New cards

Phreaker

hacks the public telephone network

43
New cards

Information extortion

is an attacker or formerly trusted insider stealing information from a computer system and demanding compensation for its return or non-use

44
New cards

Sabotage or Vandalism

Individual or group who want to deliberately sabotage the operations of a computer system or business, or perform acts of vandalism to either destroy an asset or damage the image of the organization

45
New cards

Theft

Illegal taking of another's property - physical, electronic, or intellectual

46
New cards

Theft

The value of information suffers when it is copied and taken away without the owner's knowledge

47
New cards

Physical theft

can be controlled - a wide variety of measures used from locked doors to guards or alarm systems

48
New cards

Electronic theft

is a more complex problem to manage and control - organizations may not even know it has occurred

49
New cards

malware

When an individual or group designs software to attack systems, they create malicious code/software called --

50
New cards

malware

Designed to damage, destroy, or deny service to the target systems

51
New cards

malware

Includes:

macro virus

boot virus

worms

Trojan horses

logic bombs

back door or trap door

denial-of-service attacks

polymorphic

Hoaxes

52
New cards

Virus

is a computer program that attaches itself to an executable file or application.

53
New cards

Virus

It can replicate itself, usually through an executable program attached to an e-mail.

54
New cards

Virus

The keyword is "attaches". A --cannot stand on its own.

55
New cards

Virus

There is no foolproof method of preventing them from attaching themselves to your computer

56
New cards

Antivirus software

compares virus signature files against the programming code of known viruses.

57
New cards

worm

is a computer program that replicates and propagates itself without having to attach itself to a host.

58
New cards

worms

Most infamous -- are Code Red and Nimda.

59
New cards

Code Red and Nimda.

Most infamous worms are -- and --

60
New cards

Trojan Programs

disguise themselves as useful computer programs or applications and can install a backdoor or rootkit on a computer.

61
New cards

Backdoors or rootkits

are computer programs that give attackers a means of regaining access to the attacked computer later.

62
New cards

Spyware program

A -- sends info from the infected computer to the person who initiated the spyware program on your computer

63
New cards

Spyware program

-- can register each keystroke entered.

64
New cards

Adware

Main purpose is to determine a user's purchasing habits so that Web browsers can display advertisements tailored to that user.

65
New cards

Adware

sometimes displays a banner that notifies the user of its presence

66
New cards

Spyware and Adware

Both programs can be installed without the user being aware of their presence

67
New cards

Intellectual property

"the ownership of ideas and control over the tangible or virtual representation of those ideas"

68
New cards

software piracy

Most common IP breaches involve --

69
New cards

Forces of Nature

are dangerous because they are unexpected and can occur with very little warning

70
New cards

Forces of Nature

Can disrupt not only the lives of individuals, but also the storage, transmission, and use of information

71
New cards

Forces of Nature

Include fire, flood, earthquake, and lightning as well as volcanic eruption and insect infestation

72
New cards

Forces of Nature

Since it is not possible to avoid many of these threats, management must implement controls to limit damage and prepare contingency plans for continued operations

73
New cards

Technical Hardware Failures or Errors

occur when a manufacturer distributes to user's equipment containing flaws

74
New cards

defects

These -- can cause the system to perform outside of expected parameters, resulting in unreliable service or lack of availability

75
New cards

terminal

Some errors are --, in that they result in the unrecoverable loss of the equipment

76
New cards

intermittent

Some errors are --, in that they only periodically manifest themselves, resulting in faults that are not easily repeated

77
New cards

unrevealed faults

This category of threats comes from purchasing software with --

78
New cards

attack

is the deliberate act that exploits vulnerability

79
New cards

attack

It is accomplished by a threat-agent to damage or steal an organization's information or physical asset

80
New cards

exploit

is a technique to compromise a system

81
New cards

vulnerability

is an identified weakness of a controlled system whose controls are not present or are no longer effective

82
New cards

attack

is then the use of an exploit to achieve the compromise of a controlled

83
New cards

Modern hacker profile

Age 12-60, male or female, unknown background, with varying technological skill levels; may internal or external to the organization

84
New cards

Traditional hacker profile

Age 13-18, male with limited parental supervision spends all his free time at the computer

85
New cards

Malicious Code

This kind of attack includes the execution of viruses, worms, Trojan horses, and active web scripts with the intent to destroy or steal information

86
New cards

state of the art in attacking systems in 2002

The state of the art in attacking systems in 2002 is the multi-vector worm using up to six attack vectors to exploit a variety of vulnerabilities in commonly found information system devices

87
New cards

IP Scan and Attack

Compromised system scans random or local range of IP addresses and targets any of several vulnerabilities known to hackers or left over from previous exploits

88
New cards

Web Browsing

If the infected system has written access to any Web pages, it makes all Web content files infectious, so that users who browse to those pages become infected

89
New cards

Virus

Each infected machine infects certain common executable or script files on all computers to which it can write with -- code that can cause infection

90
New cards

Unprotected Shares

using file shares to copy viral component to all reachable locations

91
New cards

Mass Mail

sending e-mail infections to addresses found in address book

92
New cards

Simple Network Management Protocol

-- vulnerabilities used to compromise and infect

93
New cards

hoax

A more devious approach to attacking computer systems is the transmission of a virus --, with a real virus attached

94
New cards

Back Doors

Using a known or previously unknown and newly discovered access mechanism, an attacker can gain access to a system or network resource

95
New cards

Password Crack

Attempting to reverse calculate a password

96
New cards

Brute Force

The application of computing and network resources to try every possible combination of options of a password

97
New cards

dictionary

The -- password attack narrows the field by selecting specific accounts to attack and uses a list of commonly used passwords to guide guesses

98
New cards

Denial-of-service (DoS)

attacker sends many connection or information requests to a target

99
New cards

Denial-of-service (DoS)

so many requests are made that the target system cannot handle them successfully along with other, legitimate requests for service

100
New cards

Denial-of-service (DoS)

may result in a system crash, or merely an inability to perform ordinary functions