IT 223 (George Mason University) Study Guide

studied byStudied by 3 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions
Get a hint
Hint

Integrity

1 / 317

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

318 Terms

1

Integrity

Info cannot be destroyed/changed; if it is, changes may be detected and data may be restored *Always Needed

New cards
2

What is the difference between integrity and Information Assurance?

Integrity = Quality
Information Assurance = Reliability

New cards
3

Availablity

Access to authorized when needed *Always Needed; Violated with DoS
ex: homepage, specific access time

New cards
4

Authentication

Verifying origin of message; Not Always Needed, Violated with phishing
ex: logging in/out

New cards
5

Non-repudiation

Shows original sender of message
*spam
*deters sender from falsely claiming they didn't send message
*used in authentication

New cards
6

Access Control

Limiting access to system resources
*use in availability

New cards
7

Security is not Absolute ...

*Trade off between security and usability
*Perfectly secure = unusable
*Perfectly insecure = no security

New cards
8

Isolation

Basic principle underlying the security of computer systems

New cards
9

InfoSec

Security of info and info systems;
Components of an info system:
*computer
*hardware
*software
*people

New cards
10

What is information?

Knowledge obtained from investigation, study, or instruction
*intelligence
*facts, data

New cards
11

What is the difference between data and information?

Data = processing information (raw material)
Information = processed data
*INFORMATION AND DATA = SYNONYMOUS

New cards
12

Where does data reside?
What does information reside?

Data reside in memory/file
Information reside in data

New cards
13

What is ISIA?

InfoSec = protection of info assets
InfoAssurance = accuracy of info

New cards
14

What is Security?

*freedom from danger; safety
*freedom from fear; surety
*something that secures; protection
*SSP

New cards
15

Why are we concerned with security of information?

We want to make sure that our information is protected, including the systems and hardware that are used to store and transmit that info

New cards
16

What are the different types of Security that might be applicable to information?

Confidentiality: Limit disclosure of meaningful data *Not Always Needed Violated by human error and theft
ex: routing number, bank account number, encryption

New cards
17

Threat

Representation of a compromise of security that is possible

New cards
18

Threat Environment

Types of attackers and attacks that companies face
ex: Virus, Hacks, Phishing

New cards
19

Threat Action

Specific instance of a threat happening
ex: DDoSing (distribution Denial of Service)

New cards
20

Threat Agent

Someone or something that creates a threat action
people who purposely attack attack - intentionally
-incident, compromise, breach = successful
-provide useful information = unsuccessful
people who make mistakes/errors human error - unintentionally
*natural events
ex: hackers, mother nature

New cards
21

Hacker

*internal/external
*Ethical = hack system with authorization
*zero-day attack = unknown vulnerability at the time of attack

New cards
22

2/3 of security incidents are ___________________ to the organization

Internal

New cards
23

Insider Threats
Why?
What can they do?

Employees and other trusted people
Detailed Knowledge of System; Operating Defense
Access things they shouldn't; Allow unknown access; harm other people; damage system; violate work law
intentional mistakes

New cards
24

Handling

Take preventive measures of denying any access of the organizations assets by ex employee

New cards
25

Outsider Threat

Hackers, Criminals, Government agents, Terrorists

New cards
26

Malware
Componets

Deliberately designed to violate security
Transport Mechanism = transport malware to where most harm can occur to system; Payload = code that does undesirable things *ex: Trojans, keyloggers

New cards
27

Trapdoor/Backdoor

Malware component intended to bypass security
audit = no evidence

New cards
28

Logic Bomb
Time Bomb

Logic Bomb = activates on conditions
Time Bomb = activates on date/time

New cards
29

Trojan Horse
RAT

Trojan Horse = disguises to be useful but harmful
RAT (Remote Access Trojan) = remote control malware

New cards
30

Software Bacterium
Software Virus
Software Worm

Software Bacterium = replicates itself
Software Virus = code attached to programs on a system *polymorphic
Software Worm = uses network to attack system *Morris worm

New cards
31

What is a rootkit?
Why is it used?

malicious code designed to control admin account
obtain privileges

New cards
32

Adware
Spyware

Ad = annoy people using advertisement popups
Spy = spy on user without his/her knowledge *gather sensitive data

New cards
33

What are some risks when performing offensive security operations?

Breaking Laws

New cards
34

Information security is NOT a technology issues, TECHNOLOGY is a PART of it

*Management of security HARD part (complex)
*Policies help us understand the WHY and WHAT
-help us understand the issues and set goals
-develop plans, with lead to actions
POLICY ---> PLAN (PROTECT --> RESPOND) --> GOALS

New cards
35

Why is security management more than just implementing security technologies?

Security management forms policies and develops a way to both implement technology to solve security problems and protect users

New cards
36

What is the goal of InfoSec?

Protect Systems

New cards
37

Security as an obstacle

Effective when viewed as an enabler

New cards
38

What is security planning?

*Strategic
*Comprehensive
*Formal
*Realistic

New cards
39

What is defense in depth? Examples?

Data, protection, host, internet network, perimeter, physical, policies, procedures, awareness
Ex: manage security

New cards
40

Why is managing security so difficult?

Difficult to quantify, predict cost, and requires communications to all levels

New cards
41

Driving Forces

issues that affect policy and planning processes

New cards
42

Compliance
Why important?

requirements to which companies must respond to
needs a planned series of actions; PRIORITIZATION

New cards
43

What the driving forces behind compliance?
Why does compliance work grow each year?

Plan, Protect, Respond
Because attackers are becoming more sophisticated and new laws and regulations appear increasing compliance work

New cards
44

Why is it important that information security NOT be seen as "cops" looking to "bust" offenders?

IT plans, protects, and responds in IT world

New cards
45

What are some strategic considerations?

Consider all scenerios

New cards
46

SOX

Sarbanes-Oxley Act of 2002 - requires public companies to evaluate their financial control processes and disclose any "material" defects *multinational cooporations

New cards
47

Issue of Privacy

Confidentiality

New cards
48

PII

Personally Identifiable Information

New cards
49

FISMA

Federal InfoSec Management Act - requires yearly audits to evaluate their infosec controls

New cards
50

CISO

Chief InfoSec officer

New cards
51

Where is an organization should the InfoSec function be placed?

within IT because IT and security share many skill sets in common and attacks tend to be within the organizations

New cards
52

What is outsourcing and its impact?

Outsourcing = email
Impact = managing large email implementation and it controls the number of on/outgoing emails

New cards
53

MSSP

Managed Security Service Provider; company the manages InfoSec functions
*not realistic to eliminate all risks
*find balance between risks and control (cost and benefits)

New cards
54

Risk Analysis

reasonable decisions by evaluating risks and controls

New cards
55

Classic Risk Analysis

estimate cost of risks and compare to cost of benefits of potential controls *difficult to use or impossible to practice
-Risk Avoidance/Transference/Reduction/Acceptance

New cards
56

What is a technical Security Architecture?

All of the companies technical countermeasure and how it is organized

New cards
57

Legacy

Out of date but still in use
*Important Principles
-Defense in Depth (multiple layers in defense)
-Minimizing Security Burdens
-Realistic Goals

New cards
58

Why is it important to identify and eliminate single points of vulnerability?
What is the function of a policy?
Why is it important?

*Because an element of the system at which an attacker can do a great deal of damage by compromising a single system
*Statements of what should and not how it should be done

New cards
59

Examples of policies related to InfoSec? What is implementation guidance in this content?

*email policies
*hiring and termination policies
*security policies
*limits the discretion of implements, in order to simplify implementations

New cards
60

What are the 3 types of implementation?

1. standards
2. guidelines
3. procedures

New cards
61

Progmulgation

Process of informing people about policy

New cards
62

What is oversight?
What are some common oversight functions?

*Process of checking compliance with a policy, enforcing policy provisions, taking corrective actions to improve the outcomes
*Automated compliance measurements, periodic manual checks/audits, looking for vulnerabilities, providing hotlines, sanctioning violations, understanding why violations occur

New cards
63

Segregation (or separation) of duties

2 or more people (or type of people or roles) are required to complete a process *personnel policies

New cards
64

What is request/authorization control?
Examples?

*Special case of separation of duties
*Where there is an exceptional/risky situation, a limited number of people can make request

New cards
65

How can exceptions to policies be handled?

Some can request, few can authorize, document the exception

New cards
66

Mandatory vacations and job rotations

Person in a specific role is required to take vacation periodically so someone else has to take that role for a time

New cards
67

What is a governance framework?
Example?

*Structure that can be used as the basis of a policy for an organization
*Committee of Sponsoring Organizations (COSO)

New cards
68

Law

Binding custom or practice of a community

New cards
69

Ethic

Set of moral principles
-Values = determining behavior
-Moral = derived from external source
-Ethics = determined collectively

New cards
70

How is law related to ethics?

Laws mandate or prohibits actions *Drawn from societal ethics

New cards
71

ACM

Association of computing machinery
-basis for ethical decision making
-basis for judging the merit of a formal complaint
*honor property rights including copyrights and patent
*give proper credit for intellectual rights
*know and respect existing laws
*acknowledge and support proper and authorized uses

New cards
72

IEEE

Institute of Electrical and Electronic Engineers
-accepting a personal obligation

New cards
73

EC Conuncil

*Protect the intellectual property of others by relying on his/her own innovation and efforts, thus ensuring that all benefits vet with its originator
*Never knowingly use software/process that is obtained/retained either illegally or unethically

New cards
74

An individual must consider all when deciding how to act such as:

*lawyer
*own conscience
*human resources

New cards
75

How are laws created in the USA?

*Produced by political process of a community
-In USA, each of the 3 branches of government has defined responsibilities in creating and enforcing laws

New cards
76

Why is compromising often a part of the process?

The rights of the individuals are BALANCED against the NEEDS of the collected whole

New cards
77

Expectation of Privacy
How do one know that it is used within the company?

*User can expect his/her information to private
-When a company states that there is/there is no expectation of privacy

New cards
78

Some Legal Protections for intellectual Property?

*Copyrights
*Patents
*Trademarks
*Exclusive rights to reproduce
*Adapt and distribute work rights

New cards
79

Why is electronic data harder to protect than tangible works?

Data files can easily be transmitted across networks

New cards
80

Copyright
What does it come into effect?
Can it be transferred?
Why is it important?

*The right to make copies of original work
*From the moment the work has been created and formatted in fixed form
*Yes
*Because data can easily be copied and stolen without altering the original and then mass produced

New cards
81

When is unauthorized access to an information system allowed?

Scanning the system parts to determine which services are offered could be considered a legitimate way of determining if access is allowed

New cards
82

Who is responsible when an employee commits a crime?

The employer or employee depending on situation

New cards
83

Access Control

Only authorized entities can use

New cards
84

Availability

Only authorized can use system when they need to

New cards
85

Policy Driven control of access to systems, data, and dialouges

*Cryptography

New cards
86

3 A's

*Authentication (verification of individuals identity)
-Requesting access = supplier
-Checking Claim = verification
*Authorization (an entity via his/her identity) is given certain permissions to access particular resources
*Auditing
-After-the-fact analysis of data collected about individuals activites

New cards
87

what are 4 different ways to authenticate a claim of identity's ? Examples?

1. What you know - password
2. What you have - smart card
3. Who you are - fingerprint
4. What you do - how you pronounce passphrase

New cards
88

2- Factor Authentication
Multi-factor Authentication
Why is it useful?

*Weak
*Requires more than one method of authentication from independent categories of credentials to verify the user's identity for a log in or other transaction
*If one method fails, there is a backup

New cards
89

How does it impact the probability of a false
negative result?

Increases probability

New cards
90

How does it impact the probability of a false positive result?

Decreases probability

New cards
91

Mandatory access control

Strict access control to gain entry; no variation allowed

New cards
92

Discretionary access control

Department can decide for individual

New cards
93

How does multilevel security (MLS) system work?

*Technology that protects against leakage of information
*Requires complex layers of control

New cards
94

Common policy requirements for physical security?
Why is it important to consider utilities?

*CCTV, Wireless Camera, Preventing dumpster diving, Locking PC when away from desk
*Electricity, Water, HVAC must be supplied to adequate level, inspected, and tested regularly
-backup generator needed

New cards
95

What are important issues to remember when disposing of computer equipment?

Ensure data destruction, keeping records of decommissioned equipment, minimize environmental liabilities and choosing right users

New cards
96

What is the role of a password in access control?
Common policy Requirements
Misusing password

*Allows restriction to vital password information on a "need to know" basis ~role-based access control
*Changing passwords (something new), 8 char long (1 change of case), 1 digit, 1 special case, and not at the end of the password
*Sharing and reusing password

New cards
97

Examples of physical devices used in access control?


What is the most important issue when using
physical access in this way?

*Cabling Security, Wiring has to be hidden
*Wiring Closets, locked and monitored

*Loss and theft are common (2 Factor Authentications eases both)

New cards
98

Biometrics
Promises what?

What is false Rejection Rate?

What is false Acceptance rate?

Examples?

Based on biological and/or behavior measurements
*promises to make reusable passwords obsolete
*requires enrollment scan
- tight = false rejections (FRR) rate of false acceptances as % of total access attempts
- loose = false acceptances (FAR) match to template that should not be made
*Finger Print recognition, IRIS scanning and face scanning

New cards
99

What are the three purposes for which biometric are commonly used?

*Verification
*Identification
*Watch List

New cards
100

Biometric Failure

-Error : when subject is not tying to fool system
-Deception : fake identity * Finger Print scanners
-Unavailability

New cards

Explore top notes

note Note
studied byStudied by 170 people
654 days ago
5.0(2)
note Note
studied byStudied by 24 people
906 days ago
5.0(2)
note Note
studied byStudied by 15 people
848 days ago
5.0(1)
note Note
studied byStudied by 6 people
98 days ago
5.0(1)
note Note
studied byStudied by 10 people
838 days ago
5.0(1)
note Note
studied byStudied by 28 people
476 days ago
5.0(1)
note Note
studied byStudied by 41 people
941 days ago
5.0(1)
note Note
studied byStudied by 307 people
163 days ago
4.0(1)

Explore top flashcards

flashcards Flashcard (24)
studied byStudied by 2 people
492 days ago
5.0(1)
flashcards Flashcard (109)
studied byStudied by 54 people
448 days ago
4.8(4)
flashcards Flashcard (37)
studied byStudied by 6 people
727 days ago
5.0(1)
flashcards Flashcard (21)
studied byStudied by 199 people
99 days ago
5.0(2)
flashcards Flashcard (24)
studied byStudied by 124 people
321 days ago
5.0(2)
flashcards Flashcard (72)
studied byStudied by 26 people
695 days ago
5.0(4)
flashcards Flashcard (50)
studied byStudied by 6 people
464 days ago
5.0(1)
flashcards Flashcard (49)
studied byStudied by 7 people
197 days ago
5.0(1)
robot