Information Security Terminologies
40 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A threat is a weakness or absence of safeguards.

False

Risk is the probability of a threat crossing or touching a vulnerability.

True

Exploits are aimed at performing unauthorized operations.

False

Passive threats modify information or change the system state.

<p>False</p> Signup and view all the answers

Network intrusion risks include information theft and data loss.

<p>True</p> Signup and view all the answers

Social Engineering and Phishing are types of network threats.

<p>True</p> Signup and view all the answers

Identity theft involves breaking into a computer to destroy or alter data records.

<p>False</p> Signup and view all the answers

Security aims to totally eliminate risk.

<p>False</p> Signup and view all the answers

A Distributed Denial of Service (DDoS) is a type of Brute Force Attack.

<p>False</p> Signup and view all the answers

Spyware can gather personal information from a computer without the user's permission.

<p>True</p> Signup and view all the answers

Tracking Cookies are always considered a form of malware.

<p>False</p> Signup and view all the answers

Adware is a type of spyware used to collect information about a user based on websites visited.

<p>True</p> Signup and view all the answers

Pop-ups are a type of spyware used to collect information about a user.

<p>False</p> Signup and view all the answers

Spam is a type of malware that can harm a computer.

<p>False</p> Signup and view all the answers

Spammers use secure email servers to forward email.

<p>False</p> Signup and view all the answers

DDoS attacks are designed to saturate and overwhelm network links with useless data.

<p>True</p> Signup and view all the answers

Malware can only destroy data and leak confidential information.

<p>False</p> Signup and view all the answers

Removable media is a propagation technique for malware.

<p>True</p> Signup and view all the answers

Malware scanners are used to monitor activity.

<p>False</p> Signup and view all the answers

A Security Policy is only for network security.

<p>False</p> Signup and view all the answers

Anti-spyware software can only detect spyware applications.

<p>False</p> Signup and view all the answers

Patches and updates are the same thing.

<p>False</p> Signup and view all the answers

Anti-virus software can only detect and remove viruses.

<p>False</p> Signup and view all the answers

Firewalls only filter incoming packets based on IP addresses.

<p>False</p> Signup and view all the answers

Firewall products are only available as software.

<p>False</p> Signup and view all the answers

Anti-spam software can only be loaded on email servers.

<p>False</p> Signup and view all the answers

Security risks can be completely eliminated with effective risk management.

<p>False</p> Signup and view all the answers

Best practices for using a firewall include physically securing servers and network equipment.

<p>True</p> Signup and view all the answers

Updating antivirus software files is not necessary for security.

<p>False</p> Signup and view all the answers

Firewalls can only block incoming packets.

<p>False</p> Signup and view all the answers

The SANS Institute lists common security mistakes to educate users on security best practices.

<p>True</p> Signup and view all the answers

Popup stopper software is only used to block pop-ups.

<p>False</p> Signup and view all the answers

End users should always open e-mail attachments without verifying their source and content.

<p>False</p> Signup and view all the answers

Installing security patches for Microsoft Office and Microsoft Internet Explorer is not important for end users.

<p>False</p> Signup and view all the answers

Senior executives should assign untrained people to maintain security without providing training or time to learn.

<p>False</p> Signup and view all the answers

Relying primarily on a firewall is a sufficient security measure for senior executives.

<p>False</p> Signup and view all the answers

IT people should connect systems to the Internet before hardening them.

<p>False</p> Signup and view all the answers

Updating systems when security holes are found is not necessary for IT people.

<p>False</p> Signup and view all the answers

Implementing firewalls with rules that stop malicious or dangerous traffic is not important for IT people.

<p>False</p> Signup and view all the answers

Educating users on what to look for and what to do when they see a potential security problem is not necessary.

<p>False</p> Signup and view all the answers

Study Notes

Information Security Assets

  • Assets include personals, hardware, software, physical devices, and documents
  • Identifying assets is crucial for creating an information security system

Security Terminologies

  • Threat: a person, thing, event, or idea that poses danger to an asset's confidentiality, integrity, availability, or legitimate use
  • Vulnerability: a weakness or absence of safeguards
  • Risk: a measure of the cost of a realized vulnerability
  • Exploits: programs, scripts, or code that perform unauthorized operations
  • Impacts: results of an exploited vulnerability (e.g., deleted files, loss of information, loss of company image)

Focus of Security

  • Security deals with managing risk to critical assets
  • Security is an exercise in loss reduction
  • Risk is the probability of a threat crossing or touching a vulnerability
  • Risk = Threat x Vulnerability

Threats

  • Accidental threats: natural disasters
  • Intentional threats: active and passive threats
    • Passive threats: do not modify information or system state
    • Active threats: alter information or system state

Network Threats

  • Risks of network intrusion: information theft, data loss and manipulation, identity theft
  • Sources of network intrusion: social engineering, phishing
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks
  • Brute force attacks: guessing passwords using a fast computer
  • Spyware and tracking cookies: collecting personal information without permission
  • Spam: sending unsolicited emails, overloading ISPs, email servers, and individual systems

Malware Capabilities

  • Destruction of data
  • Leaking confidential information
  • Providing backdoor access
  • Countless other opportunities

Propagation Techniques

  • Removable media
  • E-mail attachments
  • Web browsing
  • Social networking
  • Network vulnerabilities
  • Instant messaging applications
  • Peer-to-peer networks

Malware Defense Techniques

  • Activity monitoring programs
  • Malware scanners
  • File and resource integrity checking
  • Stripping e-mail attachments
  • Defense-in-depth
  • Patching all systems

Common Security Measures

  • Security Policy: a formal statement of rules for accessing technology and information assets
  • Updates and Patches: fixing specific problems and adding functionality to software
  • Anti-virus Software: preventing infection, detecting, and removing viruses, worms, and Trojan horses
  • Anti-Spam: identifying spam and performing an action
  • Anti-Spyware: detecting and deleting spyware applications

Firewalls

  • What is a Firewall?: a security tool that controls traffic between networks and prevents unauthorized access
  • Types of Firewall:
    • Packet Filtering
    • Application/Web Site Filtering
    • Stateful Packet Inspection (SPI)
  • Best Practices:
    • Define security policies
    • Physically secure servers and network equipment
    • Set login and file access permissions
    • Update OS and applications
    • Change permissive default settings
    • Run anti-virus and anti-spyware
    • Update antivirus software files
    • Activate browser tools

Mistakes People Make

  • The SANS Institute's lists of mistakes that lead to security breaches
  • The Four Worst Security Mistakes End Users Make
  • The Six Worst Security Mistakes Senior Executives Make
  • The Eight Worst Security Mistakes Information Technology People Make

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz covers key terms and concepts in information security, including assets, threats, vulnerabilities, and risk.

More Like This

IT Security Fundamentals Quiz
5 questions

IT Security Fundamentals Quiz

CharismaticRainbow8634 avatar
CharismaticRainbow8634
Information Security Fundamentals
5 questions
Use Quizgecko on...
Browser
Browser