Information Security Principles and Threats Overview

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/172

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

173 Terms

1
New cards

Absolute Security

The concept that no system can be made invulnerable; the goal is to make it difficult for attackers to succeed.

2
New cards

CIA Triad

The three security goals of Confidentiality, Integrity, and Availability that form the basis of all security programs.

3
New cards

Confidentiality

Keeping sensitive information private and accessible only to authorized users, often referred to as the principle of least privilege.

4
New cards

Integrity

Ensuring that data remains accurate, reliable, and unaltered, preventing unauthorized modifications.

5
New cards

Availability

Ensuring that data and systems are accessible whenever needed by authorized users, especially during emergencies.

6
New cards

Denial of Service (DoS) attacks

Common challenges to availability that disrupt access to services.

7
New cards

Defense in Depth

A strategy that involves using multiple layers of security to protect information.

8
New cards

Security Layers

Overlapping layers that provide prevention, detection, and response in information security.

9
New cards

Intrusion Detection Systems (IDS)

Devices used in defense in depth to detect unauthorized access or anomalies.

10
New cards

Security Training

Organizations must train employees on cybersecurity best practices to prevent security breaches.

11
New cards

Functional Requirements

Describe what a system should do to protect data and operations, aligning with the CIA triad.

12
New cards

Assurance Requirements

Describe how functional requirements should be implemented and tested to ensure correct performance.

13
New cards

Verification

The process of confirming that requirements are met.

14
New cards

Validation

Determining the correctness of the mechanisms used in a system.

15
New cards

Security Through Obscurity

The belief that hiding security mechanism details is sufficient for system security, which is a false sense of security.

16
New cards

Strong Encryption

A necessary component of real security, alongside multi-layer defenses and proper security policies.

17
New cards

Risk Management

The balance between the level of risk and the expected reward of expending resources on security.

18
New cards

Identity Theft

A common issue resulting from individuals being duped into giving up sensitive information.

19
New cards

Security Policies

Guidelines implemented by organizations to limit human mistakes in security.

20
New cards

Automated Mechanisms

Systems used for response in security that operate without human intervention.

21
New cards

Traffic Analyzers

Tools used in security to monitor and analyze network traffic for potential threats.

22
New cards

User IDs and Passwords

Common controls used to maintain confidentiality in information security.

23
New cards

Batch Transactions

An example of integrity models aiming to maintain data accuracy and consistency.

24
New cards

Human Monitors

Real-time personnel involved in the detection of security breaches.

25
New cards

Security

Focuses on eliminating known threats and minimizing losses if an attack succeeds.

26
New cards

Risk analysis and risk management

Central themes to securing information systems.

27
New cards

Risk outcomes

When risks are understood, they can be mitigated, insured against, or accepted.

28
New cards

Risk assessment

Considers the consequence of a loss and the likelihood that the loss will occur.

29
New cards

Risk matrix

Used to determine the degree of risk (Extreme, High, Moderate, Low).

30
New cards

Preventive controls

Designed to prevent cyber security incidents; examples include security guards, locked doors, and access controls.

31
New cards

Detective controls

Aim at detecting a breach attempt or successful breach while it is in progress; examples include closed-circuit televisions, motion sensors, and alarm systems.

32
New cards

Responsive controls

Used after a cyber security incident to minimize data loss and damage; an example is the alarm triggering doors to lock.

33
New cards

Complexity

The more complex a system gets, the harder it is to secure.

34
New cards

Best practices for security

Include using only necessary security controls, keeping software and access controls up-to-date, and following the principle of least privilege (PoLP).

35
New cards

Fear, Uncertainty, and Doubt (FUD)

Using FUD to scare management into spending on security is no longer effective.

36
New cards

Justification of security investments

IS managers must justify all investments in security using business rationale.

37
New cards

Education on security benefits

Organizations should educate people on the real benefits of security, such as data protection, trust, and business continuity.

38
New cards

People, Process, and Technology

All are needed to adequately secure a system or facility.

39
New cards

Process controls

Ensure operations are performed consistently through documented procedures.

40
New cards

Technology in security

Includes hardware and software security measures.

41
New cards

Open Disclosure of Vulnerabilities

Good for security; keeping vulnerabilities secret leads to a false sense of security.

42
New cards

Compromises to Intellectual Property

Concerns the ownership of ideas and control over their tangible or virtual representation.

43
New cards

Software piracy

The unlawful use or duplication of software, the most common IP breach.

44
New cards

Deliberate Software Attacks

Occur when individuals or groups design and deploy software to attack a system.

45
New cards

Malicious code (malware)

Designed to damage, destroy, or deny service.

46
New cards

Viruses

Spread from host to host, replicate by attaching to legitimate programs or documents, and can cause damaging effects like data corruption.

47
New cards

Worms

Spread copies of themselves from computer to computer without human interaction or needing to attach to a program; can modify/delete files, install backdoors, and deplete system resources.

48
New cards

Trojan Horses

Disguised as legitimate software, trick users into executing them, and can enable spying, data theft, and backdoor access.

49
New cards

Back Doors (Trap Doors)

Components installed by malware that allow attackers to access the system at will with special privileges.

50
New cards

Polymorphic Threats

Change their appearance over time to evade antivirus software detection.

51
New cards

Virus and Worm Hoaxes

False warnings about malware, often spread through email and internal networks.

52
New cards

Deviations in Quality of Service

Irregular service from providers (power, water, internet, phone, etc.) can disrupt business operations and threaten information security.

53
New cards

Availability disruptions

Can occur due to irregular service from providers.

54
New cards

Power issues

Blackout, brownout, fault, noise, sag, spike, surge can damage IT equipment.

55
New cards

Internet disruptions

Physical damage to cables or electronic disruptions can negatively impact communication and service delivery.

56
New cards

Service Level Agreements (SLAs)

Specify expected service levels and potential restitution for failures.

57
New cards

Espionage

Involves unauthorized individuals gaining access to protected information.

58
New cards

Competitive intelligence

Legal information gathering techniques.

59
New cards

Industrial espionage

Illegal or unethical techniques to gather information.

60
New cards

Trespass

Involves unauthorized physical or virtual actions to enter premises or systems.

61
New cards

Shoulder surfing

Gathering unauthorized information by looking over someone's shoulder.

62
New cards

Hackers

People who use computer software to gain illegal access to information.

63
New cards

Phreakers

Hack the public telephone network to make free calls or disrupt services.

64
New cards

Forces of Nature

Unpredictable events beyond human control that can disrupt information storage, transmission, and use.

65
New cards

Fire

Damages equipment and facilities, including smoke and water damage.

66
New cards

Flood

Water damage to systems and buildings, and can disrupt access.

67
New cards

Earthquake

Can directly damage systems and buildings, and disrupt access.

68
New cards

Lightning

Directly damages systems and power components, can cause fires, and disrupt access.

69
New cards

Landslide or mudslide

Damages buildings and disrupts access.

70
New cards

Tornado or severe windstorm

Damages systems and buildings, and interrupts access.

71
New cards

Hurricane or typhoon

Primarily disrupts access to facilities.

72
New cards

Tsunami

Damages systems and buildings in coastal areas, and can disrupt access and power.

73
New cards

Electronic discharge (ESD)

Static electricity can damage electronic components and disrupt service.

74
New cards

Dust contamination

Can shorten the lifespan of systems and cause downtime.

75
New cards

Human Error or Failure

Unintentional acts by authorized users that can cause extensive damage.

76
New cards

Information Extortion

Attackers or trusted insiders steal information and demand compensation for its return or non-disclosure.

77
New cards

Missing, Inadequate, or Incomplete Organizational Policy or Planning

Makes an organization vulnerable to loss, damage, or disclosure of information assets when other threats lead to attacks.

78
New cards

Information security

A management function where executive leadership is responsible for strategic planning (governance).

79
New cards

Missing, Inadequate, or Incomplete Controls

Absent, misconfigured, outdated, or poorly designed/managed security safeguards that increase the likelihood of losses.

80
New cards

Example of inadequate controls

Failing to upgrade network equipment can lead to performance issues and data loss.

81
New cards

Routine security audits

Help ensure continuous protection.

82
New cards

Sabotage or Vandalism

Deliberate acts to damage a computer system or business, or to harm an organization's image.

83
New cards

Range of sabotage

Ranges from petty vandalism to organized sabotage.

84
New cards

Attacks on an organization's image

Like website defacement, can erode consumer confidence.

85
New cards

Hacktivist operations

Disrupt systems to protest.

86
New cards

Cyberterrorism

Involves hacking systems to conduct terrorist activities.

87
New cards

Theft

Illegal taking of another's property (physical, electronic, or intellectual).

88
New cards

Physical theft

Often easier to control than electronic theft.

89
New cards

Electronic theft

Can be difficult to detect if tracks are covered carefully.

90
New cards

Technical Hardware Failures or Errors

Flaws in manufactured equipment can cause unreliable service or lack of availability.

91
New cards

Consequences of hardware failures

Can result in unrecoverable loss or intermittent faults.

92
New cards

Technical Software Failures or Errors

Bugs in code, especially when combined with certain hardware, can lead to failures.

93
New cards

Trap doors

Purposeful shortcuts bypassing security checks that can cause serious breaches.

94
New cards

Technological Obsolescence

Outdated infrastructure can lead to unreliable and untrustworthy systems and risk data integrity.

95
New cards

Management's strategic planning

Should include technology analysis and timely action to prevent obsolescence.

96
New cards

Malicious Code Attack

Includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.

97
New cards

Polymorphic worm

A state-of-the-art attack that can use up to six known attack vectors to exploit vulnerabilities.

98
New cards

Types of malware

Includes covert software applications like bots, spyware, and adware.

99
New cards

Bot

An automated software program that executes commands upon specific input and can be used to implement Trojans, logic bombs, back doors, and spyware.

100
New cards

Spyware

Gathers information about a person or organization without their knowledge.