Fundamentals of Information Systems Security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

BCP order of priorities

1) Safety and well-being of people. 2) Continuity of critical business functions and operations, whether onsite or offsite, manual, or dependent upon IT systems. 3) Continuity of IT infrastructure components within the seven domains of an IT infrastructure.

Smurf Attack

A DDoS attack in which large numbers of ICMP packets with the intended victim's spoofed source IP are broadcast to a computer computer network using an IP broadcast address. Most devices will respond by default, flooding the victims computer with response traffic.

cracker

A hacker who has hostile intent, possesses sophisticated skills, and may be interested in financial gain.

Risk Register

A list of identified risks that results from the risk-identification process. (according to PMI)

Rule Based Access Control (RBAC)

A list of rules, maintained by the data owner, determines which users have access to objects. Success depends on level of trust you have with data owners.

cookie

A text file created by a Web site and stored on a visitor's hard drive. Cookies store information about who the user is and what the user has done on the site. Can potentially include credit card and logon information.

Pharming

A type of attack that seeks to obtain personal or private financial information through domain spoofing. Pharming poisons a domain name on the DNS server.

Replay Attack

A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.

URL hijacking

A user is directed to a different website that what he or she requested, usually to a fake page that the attacker has created. Also known as typo squatting.

Biba Integrity Model

Access control model based on integrity levels. Subjects cannot read or change objects that have higher level of integrity than the subject does. Subjects cannot ask for service from subjects that have a higher integrity level.

Clark-Wilson Integrity Model

Access control model that focusses on what happens when users allowed into a system try to do things they aren't permitted to do. Also looks at integrity threats, such as verifying that software does what it is designed to do.

ISO/IEC 27005,"Information Security Risk Management"

An ISO standard that describes information security risk management in a generic manner. The documents include examples of approaches to information security risk assessment and lists of possible threats, vulnerabilities, and security controls.

Bell-LaPadula Security Model

An access control model that focuses on the confidentiality of data and the control of access to classified information. Parts of a system are divided into subjects and objects, and the current condition of a system is described as its state. Focuses on moving from secure stat to secure state.

Masquerade Attack

An attack in which one user or computer pretends to be another user or computer. Usually include IP spoofing or replaying attacks.

DNS poisoning

An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's site.

ARP poisining

Attacker sends spoofed ARP messages onto a LAN. The aim is generally to associate the attacker's MAC address with the IP address of another host, causing any traffic meant for that IP address to be sent to the attacker instead.

Availability Formula

Availability = (total time - downtime) / (total time)

Remote Access Domain Vulnerabilities

Brute-force password attacks on access and private data. Unauthorized remote access to resources. Data leakage from remote access or lost storage devices.

BCP

Business Continuity Plan. A written plan for a structured response to any events that result in an interruption to critical business activities or functions.

BIA

Business Impact Analysis. A formal analysis of an organization's functions and activities that classifies them as critical or noncritical. A BIA arranges critical activities based on importance and helps an organization determine which functions to restore in what order if there is a major interruption.

Packet sniffing

Capturing IP packets off a wireless network and analyzing the TCP/IP packet data using a tool such as Wireshark.

CRAMM

Central Computing and Telecommunications Agency Risk Analysis and Management Method. Developed in UK, based on the best practices of UK government organizations. Best suited for large organizations.

CIPA

Children's Internet Protection Act. Requires public schools and public libraries to use an internet safety policy. Restricts access to inappropriate material etc.

COPPA

Children's Online Privacy Protection Act. Restricts how online information is collected from children under 13 years of age. Defines the responsibilities of an operator to protect children's privacy and safety online.

BYOD Concerns

Data ownership, support ownership, patch management, antivirus management, forensics, privacy, onboarding/offboarding, adherence to corporate policies, user acceptance, architecture/infrastructure considerations, legal concerns, acceptable-use policy, onboard camera/video.

DRP

Disaster Recovery Plan. Directs the actions necessary to recover resources after a disaster. A DRP is part of a BCP. A BCP does not specify how to recover from disasters, only interruptions. Interruptions are generally minor events that may only disrupt one or more business process for a short period.

Patriot Act

Expanded the ability of law enforcement agencies to access information that pertains to ongoing investigations.

LAN-to-WAN Doman Vulnerabilities

Exposure and unauthorized access to internal resources from the outside. Introduction of malicious software. Loss of productivity due to lack of internet access.

Cold site

Facility with basic environmental utilities but no infrastructure components

Warm site

Facility with environmental utilities and basic computer hardware.

Hot site

Facility with environmental utilities, hardware, software, and data that closely mirrors the original data center.

Evil Twin Attack

Faking an open or public wireless network to use a packet sniffer on any user who connects to it.

FERPA

Family Educational Rights and Privacy Act. Protects the privacy of student education records. Schools must receive written permission from a parent or eligible student before releasing education records

FFIEC

Federal Financial Institutions Examination Council. Established a risk profile assessment and a cybersecurity maturity assessment that financial organizations can use as benchmarks in self assessments.

FISMA

Federal Information Security Management Act. Requires every federal agency to develop and maintain formal information security programs.

Sarbanes-Oxley Act

Federal legislation passed in 2002 that sets higher ethical standards for public corporations and accounting firms. Key provisions limit conflict-of-interest issues and require financial officers and CEOs to certify the validity of their financial statements.

DoS flooding attacks

Flooding attacks overwhelm the victim's CPU, memory, or network resources by sending large numbers of useless requests.

Government Information Security Reform Act

Focuses on management and evaluation of the security of unclassified and national security systems.

GLBA

Gramm-Leach-Bliley Act. Addresses information security concerns in the financial industry. Requires that financial institutions provide their clients a privacy notice that explains what information the company gathers about the client, where it is shared, and how it is protected.

Bluejacking

Hacking and gaining control of the Bluetooth wireless communication link between a user's earphone and smartphone device

HIPAA

Health Insurance Portability and Accountability Act. Governs the way personal medical information must be handled.

Cross-Site Scripting (XSS)

Injecting scripts into a web application server to redirect attacks back to the client. This is not an attack on the web application but rather on users of the server to launch attacks on other computers that access it.

NFC attack

Intercepting, at close range, communications between two mobile operating system devices.

User Domain Vulnerabilities

Lack of awareness or concern for security. Accidental acceptable use policy violation. Intentional malicious activity. Social engineering.

DoS logic attack

Logic attacks use software flaws to crash or seriously hinder the performance of remote servers.

IV attack

Modifying the initialization vector of an encrypted IP packet in the transmission in hopes of decrypting a common encryption key over time

Bluesnarfing

Packet sniffing communications traffic between bluetooth devices

Attack Tools

Password crackers, keystroke loggers, look at book for more.

PCI DSS

Payment Card Industry Data Security Standard. Not a law, but affects any organization that processes or stores credit card info. A comprehensive security standard that includes requirements for security management, policies, procedures, network architecture, software design, etc.

War driving

Physically driving around neighborhoods or business complexes looking for wireless access points and networks that broadcast an open or public network connection.

IT Security Policy Framework Components

Policy, Standard, Procedures, Guidelines. Policy = short statement which acts as a course of action or direction. Standard = detailed written definition for hardware and software and how they are to be used. Procedures = written instructions for how to use policies and standards. Guidelines = suggested course of action.

RPO

Recovery Point Objective. Measured in time, the RPO is the maximum amount of data loss that is acceptable. Provides direction on how to back up data, policies on recovery, and whether loss prevention or loss correction is a better option. Defines the last point in time for data recovery that can be enabled back into prduction.

RTO

Recovery Time Objective. Expresses the maximum allowable time to recover the function. Defines the amount of time it takes to recover a production IT system, application, and access to data.

California Database Security Breach Act

Requires any company that stores customer data electronically to notify its customers any time there is a security breach.

NIST SP800-30

Risk Management Guide for Information Technology Systems. Part of a series of reports which provide detailed guidance of what you should consider in risk management and risk assessment in computer security. The reports include checklists, graphics, formulas, references to U.S. regulatory issues.

IoT Challenges

Security, privacy, interoperability and standards, legal and regulatory compliance, e-commerce and economic development issues,

Spim

Spam over Internet Messaging

OCTAVE

The OCTAVE approach defines a risk-based strategic assessment and planning technique for security. It is a self-directed approach. Requires a distributed approach with business units working with the IT organization.

Mobile site

Trailer with necessary environmental utilities that can operate as a warm site or cold site.

WAN Domain Vulnerabilities

Transmitting private data unencrypted. Malicious attacks from anonymous sources. Denial of service attacks. Weaknesses in software.

LAN Domain Vulnerabilities

Unauthorized network access. Transmitting private data unencrypted. Spreading malicious software.

System/Application Domain Vulnerabilities

Unauthorized physical or logical access to resources. Weaknesses in server operating system or application software. Data loss from errors, failures, or disasters.

Workstation Domain Vulnerabilities

Unauthorized user access. Malicious software introduced. Weaknesses in installed software.

7 IT domains

User, Workstation, LAN, LAN to WAN, WAN, System/Application, Remote Acces

Rogue Access Points

Using an unauthorized network device to offer wireless availability to unsuspecting users

man-in-the-middle attack

an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

War chalking

creating a map of the physical or geographic location of any wireless access points and networks

Mandatory Access Control (MAC)

permission to access a system or any resource is determined by the sensitivity of the resource and security level of the subject. It cannot be given to someone else. Stronger than DAC.

Discretionary Access Control (DAC)

the owner of the resource decides who gets in and changes permissions as needed. The owner can give that job to others.

Nondiscretionary Access Control

when the overall system administrator within an organization tightly controls access from a centrally managed location.


संबंधित स्टडी सेट्स

Old Testament Ezra, Nehemiah, and Esther

View Set

ATI RN Maternal Newborn Online Practice 2019 A with NGN

View Set

Chapter 43 PrepU: Disorders of the Male Reproductive System The nurse is assessing a client with a collection of blood in the tunica vaginalis of the scrotum. How does the nurse correctly document this in the medical record? Hydrocele Hematocele Spermato

View Set

Weather and Climate Exam 1 Study Guide

View Set

chapter 9 bushong - Interaction of X-Radiation with Matter, Physics / X-Ray Production / Bushong Chapter 7, Physics PSC Radiography/ Bushong Chapter 8 / X-Ray Emission

View Set

Halter ch 18: feeding, eating and elimination disorders QUESTIONS

View Set