Podcast
Questions and Answers
In the early 2000s, some computing professionals and managers did recognize the value of the resources they used or controlled.
In the early 2000s, some computing professionals and managers did recognize the value of the resources they used or controlled.
False (B)
In the event of a computing crime, companies always investigate and prosecute.
In the event of a computing crime, companies always investigate and prosecute.
False (B)
A computing system includes hardware, software, data, and people.
A computing system includes hardware, software, data, and people.
True (A)
Every part of the computing system could be the target of a computing crime.
Every part of the computing system could be the target of a computing crime.
The strongest point in a computing system is the most serious vulnerability.
The strongest point in a computing system is the most serious vulnerability.
A logic bomb is a type of software vulnerability.
A logic bomb is a type of software vulnerability.
Storage media is a protected asset.
Storage media is a protected asset.
Origin Integrity provides Authentication.
Origin Integrity provides Authentication.
Data Integrity means that assets are modified only by unauthorized parties.
Data Integrity means that assets are modified only by unauthorized parties.
Availability refers to assets being accessible to unauthorized parties.
Availability refers to assets being accessible to unauthorized parties.
Frequent changes of passwords is an example of a simple but effective mechanism to maintain security.
Frequent changes of passwords is an example of a simple but effective mechanism to maintain security.
If policies align, discrepancies may create security vulnerabilities.
If policies align, discrepancies may create security vulnerabilities.
Specification is the requirements analysis and the statement of desired functionality.
Specification is the requirements analysis and the statement of desired functionality.
The design stage includes programs that carry out the design.
The design stage includes programs that carry out the design.
Recovery involves stopping the attack and repairing damage.
Recovery involves stopping the attack and repairing damage.
Intellectual Property refers to the ownership of ideas.
Intellectual Property refers to the ownership of ideas.
Using intellectual property does not require giving proper credit.
Using intellectual property does not require giving proper credit.
Amateurs are known for identifying the easiest points of entry into computer systems.
Amateurs are known for identifying the easiest points of entry into computer systems.
A 'vulnerability' refers to a safeguard implemented to minimize potential harm.
A 'vulnerability' refers to a safeguard implemented to minimize potential harm.
Human attacks, natural disasters, and the power grid are examples of threats to computer systems.
Human attacks, natural disasters, and the power grid are examples of threats to computer systems.
Disclosure, deception, disruption, and usurpation represent different categories of security breaches.
Disclosure, deception, disruption, and usurpation represent different categories of security breaches.
Accepting false data is an example of 'disclosure'.
Accepting false data is an example of 'disclosure'.
Preventing the correct operation of a system exemplifies 'disruption'.
Preventing the correct operation of a system exemplifies 'disruption'.
Encryption ensures complete availability of resources, regardless of protocol.
Encryption ensures complete availability of resources, regardless of protocol.
Software controls are typically the last aspect considered in computer security implementation.
Software controls are typically the last aspect considered in computer security implementation.
Site security is determined based on what an organization's guiding policies permit and prohibit.
Site security is determined based on what an organization's guiding policies permit and prohibit.
A 'trap door' denies access to a system, even with special privileges.
A 'trap door' denies access to a system, even with special privileges.
Shoulder surfing is a technique used in espionage or for gathering intelligence.
Shoulder surfing is a technique used in espionage or for gathering intelligence.
'Polymorphism' maintains a consistent and easily identifiable signature over time.
'Polymorphism' maintains a consistent and easily identifiable signature over time.
A 'script kiddie' is an expert who develops sophisticated software scripts for exploiting system vulnerabilities.
A 'script kiddie' is an expert who develops sophisticated software scripts for exploiting system vulnerabilities.
Using outdated security technology can lead to vulnerabilities.
Using outdated security technology can lead to vulnerabilities.
Risk analysis involves determining the need to protect trade secrets.
Risk analysis involves determining the need to protect trade secrets.
Copyrights determine the financial benefits of power and responsibility in organizations.
Copyrights determine the financial benefits of power and responsibility in organizations.
Software piracy is the most common type of breach.
Software piracy is the most common type of breach.
Malicious code is not a threat to information security.
Malicious code is not a threat to information security.
A denial-of-service attack can cause a business to be hacked out of existence.
A denial-of-service attack can cause a business to be hacked out of existence.
Worms require user initiation to replicate.
Worms require user initiation to replicate.
Espionage involves unauthorized access and data collection.
Espionage involves unauthorized access and data collection.
Blackmail is a form of information extortion.
Blackmail is a form of information extortion.
Acts of human error have no impact on information security.
Acts of human error have no impact on information security.
Natural disasters like floods and earthquakes can pose threats to information security.
Natural disasters like floods and earthquakes can pose threats to information security.
Flashcards
Deliberate acts of theft
Deliberate acts of theft
Illegal confiscation of equipment or information with intent.
Polymorphism
Polymorphism
Changes its shape over time to avoid detection.
Sabotage
Sabotage
Deliberate destruction of systems or information.
Espionage
Espionage
Signup and view all the flashcards
Technical obsolescence
Technical obsolescence
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Crackers
Crackers
Signup and view all the flashcards
Exposure
Exposure
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
Software Controls
Software Controls
Signup and view all the flashcards
Disruption
Disruption
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Usurpation
Usurpation
Signup and view all the flashcards
Policies
Policies
Signup and view all the flashcards
Software Vulnerabilities
Software Vulnerabilities
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Logic Bomb
Logic Bomb
Signup and view all the flashcards
Trapdoor
Trapdoor
Signup and view all the flashcards
Data Security
Data Security
Signup and view all the flashcards
Weakest Point Vulnerability
Weakest Point Vulnerability
Signup and view all the flashcards
Risk Analysis
Risk Analysis
Signup and view all the flashcards
Trade Secrets
Trade Secrets
Signup and view all the flashcards
Copyrights
Copyrights
Signup and view all the flashcards
Trademarks
Trademarks
Signup and view all the flashcards
Patents
Patents
Signup and view all the flashcards
Software Piracy
Software Piracy
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Denial-of-Service Attack
Denial-of-Service Attack
Signup and view all the flashcards
Worms
Worms
Signup and view all the flashcards
Data Integrity
Data Integrity
Signup and view all the flashcards
Origin Integrity
Origin Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Security Goals
Security Goals
Signup and view all the flashcards
Hardware Vulnerabilities
Hardware Vulnerabilities
Signup and view all the flashcards
Legal Controls
Legal Controls
Signup and view all the flashcards
Cost-Benefit Analysis
Cost-Benefit Analysis
Signup and view all the flashcards
Intellectual Property
Intellectual Property
Signup and view all the flashcards
Security Mechanisms
Security Mechanisms
Signup and view all the flashcards
Study Notes
Computer Networks and Security
- Computer security is a concern for all computing professionals and managers.
- Intrusion can happen at any point in the computing system (hardware, software, data, people).
- The weakest part of a system is the most vulnerable.
- Security breaches include exposure (potential loss), vulnerability (system weakness), attack (human or natural), threats (human, natural, error), control (protective measure), and assets (hardware/software/data).
Types of Security Breaches
- Disclosure: unauthorized access to information (snooping)
- Deception: acceptance of false data (modification, spoofing, repudiation of origin, denial of receipt)
- Disruption: prevention of correct operation (modification, man-in-the-middle attack)
- Usurpation: unauthorized control of a system part.
Security Components
- Confidentiality: restricted access to assets
- Integrity: assets modified only by authorized parties.
- Availability: authorized parties can access assets
- Enables access to data and resources.
Security Vulnerabilities
- Hardware vulnerabilities
- Software vulnerabilities
- Data vulnerabilities
People Involved in Computer Crimes
- Amateurs
- Crackers
- Career criminals
Security Methods
- Encryption: protecting data confidentiality. Using encryption doesn't solve all security issues.
- Software controls (internal programs and development).
- Hardware controls (OS).
- Policies and mechanisms (define permitted/forbidden actions, enforce via mechanisms/simple but effective e.g., password changes).
Security Goals
- Prevention: stop attacks.
- Detection: find attacks.
- Recovery: stop attack, assess, and fix damage. Continue normal operations successfully even in attacks.
Threats to Information Security
- Intellectual property: piracy, software attacks.
- Software attacks: viruses, worms, malicious code, denial-of-service attacks
- Deviations in quality of service: ISP, power, WAN service problems
- Espionage or trespass: unauthorized access or data collection, hackers
- Forces of nature: fire, floods, earthquakes, lightning
- Acts of human error or failure: accidents, employee mistakes
Deliberate Acts
- Information extortion: blackmail, demanding compensation.
- Sabotage or vandalism: deliberate damage to a system or organization.
- Theft (physical, electronic, intellectual property).
- Cyber terrorism.
- Social engineering: manipulating users.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.