Podcast
Questions and Answers
What is the name of the business policy that permits or encourages employees to use their own mobile devices to access company computing resources and applications?
What is the name of the business policy that permits or encourages employees to use their own mobile devices to access company computing resources and applications?
Bring Your Own Device (BYOD)
What is the name of the act that states it is legal to spam, provided the messages meet a few basic requirements?
What is the name of the act that states it is legal to spam, provided the messages meet a few basic requirements?
CAN-SPAM Act
What is the term used to describe a program that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge?
What is the term used to describe a program that enables its user to gain administrator-level access to a computer without the end user's consent or knowledge?
Rootkit
What is the name of the attack that floods a target site with requests for data and other small tasks, leading to problems or slowdowns on the target site?
What is the name of the attack that floods a target site with requests for data and other small tasks, leading to problems or slowdowns on the target site?
Signup and view all the answers
What is the term used to describe the theft of personal information and then used without their permission?
What is the term used to describe the theft of personal information and then used without their permission?
Signup and view all the answers
What is the name of the software that provides a comprehensive display of all vital data related to an organization's security defenses?
What is the name of the software that provides a comprehensive display of all vital data related to an organization's security defenses?
Signup and view all the answers
What is the name of the software that scans for specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus?
What is the name of the software that scans for specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus?
Signup and view all the answers
Computer attackers often target vulnerable systems.
Computer attackers often target vulnerable systems.
Signup and view all the answers
The US-CERT regularly updates a summary of the most frequent, high-impact vulnerabilities.
The US-CERT regularly updates a summary of the most frequent, high-impact vulnerabilities.
Signup and view all the answers
To address vulnerabilities, it is important to keep applications and OSs up-to-date.
To address vulnerabilities, it is important to keep applications and OSs up-to-date.
Signup and view all the answers
What is the acronym for the policy that allows employees to use their own mobile devices to access company resources?
What is the acronym for the policy that allows employees to use their own mobile devices to access company resources?
Signup and view all the answers
What does CAPTCHA stand for?
What does CAPTCHA stand for?
Signup and view all the answers
What is the name for a group of computers taken over by a malicious hacker, and used to flood a target site with requests?
What is the name for a group of computers taken over by a malicious hacker, and used to flood a target site with requests?
Signup and view all the answers
What is the name for a set of programs that provide administrative access to a computer without the end user's knowledge?
What is the name for a set of programs that provide administrative access to a computer without the end user's knowledge?
Signup and view all the answers
Phishing is a form of social engineering that attempts to obtain sensitive information by disguising as a trustworthy entity.
Phishing is a form of social engineering that attempts to obtain sensitive information by disguising as a trustworthy entity.
Signup and view all the answers
What term describes a variation of phishing, where the fraudulent emails are sent to a certain organization's employees?
What term describes a variation of phishing, where the fraudulent emails are sent to a certain organization's employees?
Signup and view all the answers
Data breaches can sometimes lead to identity theft.
Data breaches can sometimes lead to identity theft.
Signup and view all the answers
Which of these is NOT a security measure that e-commerce websites use to protect customer information?
Which of these is NOT a security measure that e-commerce websites use to protect customer information?
Signup and view all the answers
Computer crime is a growing area of concern that requires careful management attention.
Computer crime is a growing area of concern that requires careful management attention.
Signup and view all the answers
Organizations should implement a layered security solution to make it difficult for attackers to compromise their systems.
Organizations should implement a layered security solution to make it difficult for attackers to compromise their systems.
Signup and view all the answers
The US-CERT regularly updates a summary of the most frequent and critical vulnerabilities reported.
The US-CERT regularly updates a summary of the most frequent and critical vulnerabilities reported.
Signup and view all the answers
User accounts that remain active after employees leave a company are not a security concern.
User accounts that remain active after employees leave a company are not a security concern.
Signup and view all the answers
It is not necessary to create roles and user accounts that align with the specific responsibilities of each individual.
It is not necessary to create roles and user accounts that align with the specific responsibilities of each individual.
Signup and view all the answers
Study Notes
Chapter 13: Cybercrime and Information System Security
- Cybercrimes are increasing
- Organizations are implementing countermeasures to combat cybercrime
- Computer incidents are prevalent due to increasing complexity, expanding and changing systems, and increased prevalence of BYOD policies
Objectives
- Explain why computer incidents are so prevalent
- Identify and describe types of computer exploits and their impact
The Threat Landscape
- Cybercrimes are increasing
- Organizations are implementing countermeasures
Why Computer Incidents Are So Prevalent
- Increasing complexity increases vulnerability: Cloud computing, networks, computers, mobile devices, virtualization, OS applications, websites, switches, routers, and gateways are interconnected with millions of lines of code.
- Expanding and changing systems introduce new risks: It's difficult for IT organizations to keep up with the technological pace, ongoing assessment of security risks and to implement approaches.
- Increased prevalence of BYOD policies: Businesses allow employees to use their own devices for company computing, but this makes safeguarding devices and applications more complex.
Why Computer Incidents Are So Prevalent - Continued
- Increasing sophistication of those who would do harm: Today's computer attacks are organized and target organizations and websites.
Types of Exploits
- Common attacks include: Ransomware, Viruses, Worms, Trojan Horses, Spam, DDoS attacks, Rootkits, Phishing and Identity theft.
Ransomware
- Malware that prevents computer or data access until a ransom is paid.
Viruses
- A piece of code disguised as something else that causes unexpected computer behavior. Spreads when a user shares an infected file (e.g., in an email).
Worms
- Harmful programs that duplicate without human intervention. Malware can be a worm and ransomware at the same time.
Trojan Horses
- Seemingly harmless program with hidden malicious code. Victims are tricked into opening it. Trojan horses can destroy hard drives, corrupt files, control computers remotely, steal passwords, and spy on users.
Spam
- Unwanted or unrequested emails used for marketing, often inexpensive. The CAN-SPAM Act states spam is legal if messages meet few basic requirements such as no false return address, a label identifying it as an ad or solicitation, and a way to opt out of future mailings.
Spam-Continued
- CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is software that generates tests to distinguish humans from automated programs, bots preventing spamming. New CAPTCHAs include traffic light images
Distributed Denial-of-Service Attacks (DDoS)
- Attackers take over a large group of computers (botnets) and flood a targeted site with requests for data or tasks, causing site problems and slowdowns
Rootkits
- Enables a user to gain administrator-level access to a computer without permission or knowledge of the owner.
Phishing
- Fraudulent emails to get recipients to reveal personal data, often disguised as legitimate requests.
- Spear phishing is directed at specific organizations and targets specific employees, often higher-level executives.
Identity Theft
- Theft of personal information and using it without permission
- Data breach is the unintended release of sensitive data due to unauthorized access; most e-commerce websites use HTTPS encryption to protect information during transmission.
Federal Laws for Prosecuting Computer Attacks
- Laws such as the Computer Fraud and Abuse Act, identity theft, and the USA Patriot Act address computer crime to protect computer systems.
Prevention
- Organizations should implement layered security solutions (multiple layers to prevent an attack).
- Educating employees and contract workers to guard passwords, prohibit using passwords, apply strict access controls, reporting unusual activity and protect portable devices.
- Implementing a corporate firewall (software, hardware or combination) between the internal network and internet.
- Utilizing a security dashboard to provide a comprehensive data display regarding security defenses.
- Installing antivirus software to scan for virus (signature) presence and delete or quarantine the virus if found.
- Implementing safeguards against attacks by malicious insiders by deleting accounts of departing employees, creating roles and accounts based on duties.
- Addressing critical internet threats by fixing vulnerabilities using patches to software and keeping applications and OSs up-to-date.
Summary
- Computer crime is important to address.
- Organizations must take strong measures to ensure secure and reliable computing experiences.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers Chapter 13 on the rising threat of cybercrime and the importance of information system security. It explores the prevalence of computer incidents and the impact of various cyber exploits. Understand the factors that contribute to these trends and the strategies organizations are using to mitigate risks.