Information security Flashcards

(30 cards)

1
Q

What is information security?

A

is the protection of information assets.
* Specifically, organizations want to make sure that their information is:
– Available only to authorized personnel. (Confidentiality)
– Free from unauthorized alterations (integrity)
– Available when needed. (Availability)
* Anything that negatively impacts on these desired characteristics is viewed as a Threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reasons systems Are Vulnerable?

A

– The Internet
– Malicious software
– Hackers and Cyber vandalism
– Computer Crime
– Cyber terrorism and Cyber warfare
– Employees
– Natural Disasters
– Software Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why Systems Are Vulnerable? The Internet

A

These days you can sit in the comfort of your home and hack into the banks computers.
* The Internet is a huge network of networks with no central authority. Anyone can connect anonymously from almost anywhere in the world.
* Launching physically remote attacks is much less risky for the attacker.
* Security was not a design goal during early ARPANET discussions. The ARPANET was primarily a networking experiment.
* The designers assumed that security would handled elsewhere and never foresaw that the ARPANET would grow to what it is today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why Systems Are Vulnerable? Hackers and Cyber vandals

A
  • At one time hackers needed to have advanced computer skills. However, hacker tools now freely available on the Internet.
  • At one time hackers would steal information or deface a web site purely for bragging rights. Military and high profile sites were their preferred playgrounds.
  • Today hackers are part of organized crime gangs. Their intent is now to steal information for resale and extortion.
  • They also use worms, trojans and viruses to create networks of “zombie computers”. They then rent these networks to spammers, terrorists and other organized crime gangs. * Hackers also use a technique called Phishing to steal peoples identities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A hacker or cracker

A

is an individual who tries to gain unauthorized access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why Systems Are Vulnerable? Computer Crime

A
  • At one time there were few laws governing computer crime or cyber crime as it is sometimes called.
  • Many countries have now enacted legislation making attempts to steal, destroy or deny use of computer information a crime.
  • Cyber criminals can be external hackers or employees/contractors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why Systems Are Vulnerable? Cyberwar and Cyber terrorism

A
  • Cyber war (Information Warfare ) deals with attacking the information assets of an enemy.
  • Military Planners now realize that they can seriously harm or even cripple an enemy by attacking its information assets.
  • Targets include the electricity grid, telephone networks and banking systems.
  • These are often attacked before conventional military targets.
  • In May 2007, Estonia accused Russia of launching cyber attacks against its parliament, ministries, banks, and media.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why Systems Are Vulnerable? Malicious software

A
  • Most of you should have been a victim of some form of malicious software, software designed to do you harm.
    – Virus
    – Worms
    – Trojan Horse
    – Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why Systems Are Vulnerable? Employees

A
  • Employees and other authorized users can seriously damage information assets.
  • Disgruntled employees often do this on purpose.
  • Other employees do this by accident primarily because they have not been properly trained.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why Systems Are Vulnerable Natural Causes

A
  • Information assets can also be damaged by fire, flood and events like hurricanes and tornados.
  • The events in Grenada, the Cayman Islands, New Orleans (and now New York!!!) should convince us that we should take these threats seriously.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why Systems Are Vulnerable Software Vulnerabilities

A
  • Thus many systems are released for sale with thousands of “bugs” still in place.
  • These bugs can cause unexpected results or introduce vulnerabilities that can subsequently be exploited by hackers.
  • Consequently corporations and users are advised to download and apply the latest bug fixes on a regular basis.
  • Unfortunately, many companies do not do a good job of applying these patches and many of the disruptions you read about occur unpatched systems.
  • Sometimes the vulnerabilities had been documented, and a patch released up to six months prior to the attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Business Value of Security

A

Many organizations are now so dependent on their information processing infrastructure that a loss of function is regarded as a business disaster.
* Companies can loose millions of dollars a day if their systems fail to function. The market value of eBay shares temporarily declined by several BILLION dollars after their servers crashed several times in quick succession back in 1998/1999.
* While hardware and software can be replaced, data, if not backed up, is gone forever. Several companies have gone out of business after a security incident simply because they could not recover their operational data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Business Value of Security pt 2

A
  • Security is also becoming more important as governments legislate minimum standards for information protection.
  • Failure to conform to these standards can lead to fines and the negative publicity can damage brands.
  • Imagine if your bank was fined for failing to meet basic security standards!! What would you do? * Cost of cleanup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Business Value of Security * The US legislation that impacts on security standards include:

A

– The Health Insurance Portability and Accountability Act (HIPAA)
– The Financial Services Modernization Act (GrammLeach-Bliley Act)
– The Public Company Accounting Reform and Investor Protection Act (Sarbanes-Oxley)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Business Value of Security * The TT legislation that impacts on security standards include:

A

– The Computer Misuse Act of 2001
– Electronic Transfer of Funds Crime Act (2000)
– The Electronic Transactions Act (2011) (Awaiting Proclamation)
– The Data Protection Act of 2011 (Awaiting Proclamation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Information Security Policy

A
  • In order to protect information assets, an organization must develop an information security policy.
  • This policy states
    – What assets need to be protected
    – Who has access to these assets
    – What resources are available/needed to protect these assets
    – Who is responsible for protecting these assets.
17
Q

Risk analysis

A
  • Risk analysis in an important input to the information security development process.
  • Risk analysis looks at the impact of a threat (financial loss, damage to reputation) as well as the likelihood of the threat occurring.
18
Q

There are several technology tools available to protect information assets. These include:

A

– Access Control Systems
– Firewalls
– Intrusion Detection Systems
– Anti Virus Software
– Public Key Encryption
– Backup

19
Q

Security Technologies Access Control-authorization

A
  • Access control refers to all the policies, procedures and technologies used to control access to information assets
  • Two access control concepts are authorization and authentication.
  • Authorization determines who has access to what information. * Once of the primary principles of access control is that people should be given only enough access to do their jobs and no more.
  • Authentication is the process whereby a user’s identity is verified before access granted. * User names and passwords are the simplest form of authentication technology.
20
Q

Security Technologies Access Control-biometrics

A
  • Unfortunately password are a weak form of authorization as people choose weak and easily guessable passwords, share their passwords or write them down.
  • Stronger authentication systems include tokens as well as some forms of biometric identification.
  • Biometric identification systems use finger prints, voice recognition and iris scans.
21
Q

Security Technologies Firewalls

A
  • A firewall is a specialized computer that monitors traffic traveling between two networks. * Firewalls administrators set up complex rules that the firewall uses to allow or reject traffic.
  • The most common location for a firewall is between the Internet and a private network. However some companies place firewalls between departments.
22
Q

Security Technologies Intrusion Detection Systems

A
  • Intrusion detections systems are the electronic equivalent of tripwires.
  • Special software agents monitor the state of files at critical locations on the network. These agents alert administrators via pager, alarms, etc is they detect an intrusion.
  • Intrusion detection systems can also be programmed to shut down the system if it detects an attack.
23
Q

Security Technologies Anti Virus Systems

A
  • Anti Virus systems check primary and secondary memory to detect traces of computer viruses.
  • Corporations now scan all email passing through their email server and quarantine any message carrying an attached virus.
  • Anti virus software is not failsafe. There is normally a lag of a few hours between the release of a brand new virus and the release of updated AV software.
  • Millions of computers can be infected during this lag.
24
Q

Security Technologies Public Key Encryption

A
  • Encryption systems convert “clear text” into scrambled “cipher text” so that even is a message is intercepted it will look like garbage text.
  • Encryption systems rely on sophisticated algorithms to “scramble” clear text.
  • A special numeric key (crypto variable) is by the algorithms to “lock” and “unlock” encrypted messages.
  • The most widely used encryption system is based on two keys – a public key and a private key.
25
Security Technologies Public Key Encryption-example
* With PKE both parties have a public key and a private key. The public keys are made available to everyone. * Now if A wants to send B an encrypted message, A would get B’s public key, encrypt the message and send it to B. B would use her closely guarded private key to decrypt the message. * Only the Private Key can unlock a message.
26
* General controls include all the controls used to manage the information systems function. They include
– Software controls – Hardware controls – Operations controls – Data security controls – Systems implementation controls – Administrative controls
27
General controls-software and hardware
* Software: Monitor use of software and prevent unauthorized use of programs. * Hardware: Ensure that all hardware is physically secure and is protected from water, humidity or fire damage. Also makes sure that back up facilities are available in case of disaster.
28
General controls-data, operations and implementation
* Data: Ensure that all data is properly backed up and not subject to unauthorized use. * Operations: Make sure that jobs are properly scheduled and managed and that only authorized people run these jobs. * Implementation: Ensure that new systems go through a rigorous process of justification, design, testing, risk analysis and implementation
29
Application controls
include the automated and administrative controls that ensure an application completely and accurately processes the data given to it. * These are normally classified as input, processing or output controls.
30
One of the challenges faced by management is striking a balance between over control and under control.
* Over control makes the system difficult to use and can be frustrating to users. * Under control leaves the systems exposed and vulnerable.