Information Security Lecture Notes

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary and concepts from the Information Security lecture notes, including types of threats, vulnerabilities, deliberate attacks, risk management strategies, and security controls.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

Threat

Any danger to which an information resource may be exposed.

2
New cards

Exposure

The harm, loss, or damage that can result if a threat compromises an information resource.

3
New cards

Vulnerability

The possibility that an information resource will be harmed by a threat.

4
New cards

Human Error

Carelessness by employees or other insiders, posing significant threats, especially from higher-level employees due to greater access privileges.

5
New cards

Social Engineering

An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

6
New cards

Tailgating

A form of social engineering where an unauthorized person gains physical access to a restricted area by following an authorized person.

7
New cards

Spear phishing

A social engineering attack targeting specific high-value individuals or groups, custom-tailoring attacks to improve the chances of obtaining sensitive personal information.

8
New cards

Phishing

A social engineering attack that uses deception to acquire sensitive personal information by masquerading as official-looking emails or instant messages.

9
New cards

Shoulder surfing

A social engineering technique where an attacker observes a person's personal information by looking over their shoulder.

10
New cards

Deliberate threats

Malicious actions performed by malicious individuals using technical means to disrupt an organization's regular business operations, identify IT weaknesses, gain protected information, or further an attack plan via access to IT systems.

11
New cards

Espionage or trespassing

Occurs when an unauthorized individual attempts to gain illegal access to organizational information.

12
New cards

Information extortion

Occurs when an attacker either threatens to steal, or actually steals, information from a company, demanding payment for not stealing, returning, or disclosing the information.

13
New cards

Ransomware

Malicious software that blocks access to a computer system or encrypts an organization’s data until the organization pays a sum of money.

14
New cards

Sabotage or vandalism

Deliberate acts that involve defacing an organization’s website, potentially damaging the organization’s image and causing its customers to lose faith.

15
New cards

Hacktivist or cyberactivist operation

A form of online vandalism performed by individuals or groups with a political or social agenda.

16
New cards

Dumpster diving

Rummaging through commercial or residential trash to find discarded information like paper files, letters, memos, photographs, IDs, passwords, and credit cards.

17
New cards

Compromises to intellectual property

Threats that involve the unauthorized use, disclosure, or theft of exclusive creations of the mind.

18
New cards

Alien software

Clandestine software that is installed on your computer through duplicitous methods, enabling other parties to track Web surfing habits and personal behaviors.

19
New cards

Adware

A type of alien software that displays unwanted advertisements.

20
New cards

Keyloggers

A type of alien software that records keystrokes made on a keyboard.

21
New cards

Supervisory control and data acquisition (SCADA) attacks

Attacks against systems used to monitor or control chemical, physical, and transport processes such as those used in oil refineries, water treatment plants, and power plants.

22
New cards

Virus

Segment of computer code that performs malicious actions by attaching to another computer program.

23
New cards

Polymorphic virus

Segment of computer code that modifies itself to avoid detection by anti-malware systems, while keeping the same functionality.

24
New cards

Worm

Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program).

25
New cards

Whaling attack

A phishing attack that targets specific high-value individuals such as senior executives in an attempt to steal sensitive information from a company.

26
New cards

Smishing attack

A phishing attack carried out over mobile text message (Short Message Service phishing).

27
New cards

Vishing attack

Short for 'voice phishing,' these attacks attempt to defraud people over the phone.

28
New cards

Denial-of-service attack

An attacker sends so many information requests to a target computer system that the target cannot manage them successfully and typically ceases to function (crashes).

29
New cards

Distributed denial-of-service attack

An attacker first takes over many computers (zombies or bots) to form a botnet, which is then used to deliver a coordinated stream of information requests to a target computer, causing it to crash.

30
New cards

Trojan horse

Software programs that hide in other computer programs and reveal their designed behaviour only when they are activated.

31
New cards

Back door

Typically a password, known only to the attackers, that allows them to access a computer system at will, without having to go through any security procedures (also called a trap door).

32
New cards

Logic bomb

A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action under specific conditions.

33
New cards

Risk mitigation

Has two functions: implementing controls to prevent identified threats from occurring, and developing a means of recovery if the threat becomes a reality.

34
New cards

Communication Controls

Measures dealing with the movement of data across networks, including firewalls, anti-malware systems, encryption, and VPNs.

35
New cards

Firewalls

Network security devices that monitor and filter incoming and outgoing network traffic based on an organization's previously established security policies.

36
New cards

Anti-malware systems

Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.

37
New cards

Whitelisting

A strategy under which only pre-approved or trusted users, entities, or actions are allowed to operate on a system or network.

38
New cards

Blacklisting

A strategy under which certain users, entities, or actions are explicitly denied permission to operate on a system or network.

39
New cards

Encryption

The process of converting an original message into a form that cannot be read by anyone except the intended recipient.

40
New cards

Virtual private networking (VPN)

A method used to add security and privacy to private and public networks, like WiFi hotspots and the Internet.

41
New cards

Transport Layer Security (TLS)

An encryption standard used for secure transactions such as credit card purchases and online banking, which is the successor to SSL.

42
New cards

Application controls

Security countermeasures that protect specific applications in functional areas, including input, processing, and output controls.

43
New cards

Input controls

Programmed routines that edit input data for errors before they are processed.

44
New cards

Processing controls

Programmed routines that perform actions part of record-keeping, reconcile transactions, or monitor application operations.

45
New cards

Output controls

Programmed routines that edit output data for errors or help to ensure that output is provided only to authorized individuals.

46
New cards

Business Continuity Planning

The chain of events linking planning to protection and to recovery, aiming to provide continuous availability and ensure critical systems are operating after a failure or attack.