Chapter 2 - Secure Information Systems

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Employee:Actually, I just bought a new tablet recently that I really like. Will I be able to use that tablet for work? You:Yes, we have a______so you can use your tablet to access company computing resources and applications.

A BYOD (bring your own device) policy permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.

A distributed denial-of-service (DDoS)

A distributed denial-of-service (DDoS) attack is one in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks. it keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in—the Internet equivalent of dialing a telephone number repeatedly so that all other callers hear a busy signal.

Patch

A general software security update intended to cover vulnerabilities that have been discovered

Worm

A harmful program that resides in the active memory of the computer and duplicates itself. Differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email

Incident Notification

A key element of any response plan is to define who to notify and who not to notify in the event of a computer security incident.

Firewall

A part of a computer system or network that is designed to block unauthorized access while permitting outward communication

Virus

A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner

Trojan Horse

A seemingly harmless program in which malicious code is hidden. A victim is usually tricked into opening it because it appears to be useful software from a legitimate source

Rootkit

A set of programs that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure its presence from legitimate system administrators

Smishing

A variation of phishing that involves the use of texting

Zero-Day Attack

An attack that takes place before the security community becomes aware of and fixes a security vulnerability

Hacktivist

An individual who hacks computers or Web sites in order to promote a political ideology

Careless Employee

An insider (employee, business partner, contractor, consultant) who does not follow the organization's security polices and enables a cyberattack to occur

Malicious Employee

An insider who deliberately attempts to gain access to and/or disrupt a company's information systems and business operations

Zombie Computer

Based on a command by the attacker or at a preset time, the botnet computers (called zombies) go into action, each sending a simple request for access to the target site again and again—dozens of times per second.

eradication

Before the IT security group begins the eradication effort, it must collect and log all possible criminal evidence from the system and then verify that all necessary backups are current, complete, and free of any malware.

a lesser uses her laptop to sign onto her company's database server from open Wi-fi connection at a local coffee shop

Careless insider

computer forensics

Computer forensics is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

Erica is late to work because the computer virus shut down the city's bus system

Cyberterrorist

derek uses his old accounts credentials to sign into his former employees network to get information on his old clients

Malicious employee

CEO:This report might give us a good picture of where we are right now, but what about in the future? How can we track ongoing concerns to make sure gaps in our security coverage don't open up later?You:It's good to do a risk assessment every year. In the meantime, we can use a_______ to help track key performance indicators tied to our security strategies.

Many organizations employ a security dashboard to help track the key performance indicators of their security strategy.

Employee:That's good to hear. Will you have to make any changes to it before I can use it for work? You:We'll scan it for any security vulnerabilities and apply the necessary_____ to close those gaps.

Once a vulnerability is discovered, users should install a patch to eliminate the problem.

CEO:So this would tell us where our security weaknesses are. Any idea how much it will cost to eliminate those vulnerabilities?You:Unfortunately, we can never eliminate all vulnerabilities unless we just stop doing business. Once we get the report, we can determine how much investment is needed to reach a level of______ that balances security costs with a level of risk we're comfortable with.

Reasonable assurance is the recognition that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.

Vishing

Similar to smishing except that the victims receive a voice mail message telling them to call a phone number or access a Web site

Cybercriminal

Someone who attacks a computer system or network for financial gain

Lone Wolf Attacker

Someone who violates computer or Internet security maliciously or for illegal personal gain

Cyberterrorist

State-sponsored individual or group who attempts to destroy the infrastructure components of governments, financial institutions, corporations, utilities, and emergency response units

HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) requires health care organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records, thus making it possible to exchange medical data over the Internet.

Phishing

The act of fraudulently using email to try to get the recipient to reveal personal data

After deploying several of the recommended security improvements, you suggest that the final and most important step in protecting the organization's security perimeter is

The importance of end-user education cannot be overly emphasized. Creating and enhancing user awareness of security policies is an ongoing security priority for companies. Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow security policies.

Incident Containment

The incident response plan should clearly define the process for deciding if an attack is dangerous enough to warrant shutting down or disconnecting critical systems from the network

Social Engineering

The use of deception to trick individuals into divulging data needed to gain access to an information system or network

Spam

The use of email systems to send unsolicited email to large numbers of people

your company's customer service line .... their data is included in the breach

business disruption

ex of zero day attack

can lead to an attack that exposes name, addresses, Social Security numbers, drivers license, And usually the original software manufacturer is an informed of the zero day vulnerability

ashley hacks into a local stores payment processing system and transferred money to her paypal account

cybercriminal

shareholders experience day 19% drop and share value in the 24 hours after the breach was publicized

direct impact

jeffrey steals emails from one of his state's political candidates and post online

hacktivist

the company offers one year of customer credit monitoring for customers whose credit information was compromised

legal consequences

Ransomware

malware that stops you from using your computer or accessing the data on your computer until you meet certain demands such as paying ransom or in some cases sending compromising photos

your company's it operation team works around the clock to identify how the breach occurred and implement needed patches to prevent further damage

recovery cost

cells activity for the quarter drops 22% a tough hit in the middle of the holiday shopping season

reputation damage

Employee:Does that mean my tablet will be safe going forward? You:Not necessarily. For example, a(n) ____could take advantage of a newly discovered vulnerability before it's patched.

zero day attack

Incident Follow-Up

•An essential part of follow-up is to determine how the organization's security was compromised so that it does not happen again. •A formal incident report includes a detailed chronology of events and the impact of the incident.

Protection of Evidence and Activity Logs

•An organization should document all details of a security incident as it works to resolve a security incident. •Capture all system events, the specific actions taken (what, when, and who), and all external conversations (what, when, and who) in a logbook.

Botnet

. The term botnet is used to describe a large group of such computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their legitimate owners.


Ensembles d'études connexes

Property and Casualty Practice PSI Exam

View Set

Entrepreneurial Small Business 5th Edition; Chapter 3

View Set

MGT 434 Consumer Behavior QUIZZES

View Set

Multiple Sclerosis, Myasthenia Gravis, Parkinsons e11, e12, flashcards, P,D, +A

View Set