Information Systems Security and Threats
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What makes information theft generally invisible to defenders?

  • There are clear signs of compromise.
  • Physical assets are also compromised at the same time.
  • Information theft often occurs in public spaces.
  • It typically goes unnoticed unless specifically searched for. (correct)
  • Which of the following is a reason for underestimating the risk of information compromise?

  • Compromised assets are often destroyed.
  • Physical assets are monitored more actively.
  • Information theft can be easily detected.
  • The compromised information remains intact and accessible. (correct)
  • What type of attack did Keith Rhodes’ team use against a US Government department?

  • Self-inflicted DDoS attack (correct)
  • Virus deployment
  • Phishing attacks
  • Brute force password cracking
  • According to Rhodes, how secure are user IDs and passwords for protecting SCADA systems?

    <p>Inadequate, as they can be broken in 24 hours.</p> Signup and view all the answers

    What is one of the primary causes of information loss in organizations?

    <p>Negligence or ignorance.</p> Signup and view all the answers

    What vulnerability is introduced by insiders using flash drives?

    <p>Accidental introduction of malware.</p> Signup and view all the answers

    Which of the following factors increases the risk of information compromise?

    <p>Multi-tenancy buildings with shared infrastructure.</p> Signup and view all the answers

    What is commonly associated with social engineering attacks?

    <p>Manipulating individuals into revealing sensitive information.</p> Signup and view all the answers

    What is a major concern regarding information security in many British companies?

    <p>Dependence on the honesty and integrity of staff.</p> Signup and view all the answers

    Which of the following practices does NOT contribute to vulnerabilities in information protection?

    <p>Using a unique password for different platforms.</p> Signup and view all the answers

    How does Chris Davy describe the level of information protection in cases where leaks have occurred?

    <p>Reckless.</p> Signup and view all the answers

    What risky behavior is commonly observed among employees according to Ponemon (2012)?

    <p>Reusing the same password across different sites.</p> Signup and view all the answers

    What is one of the top risky practices identified by Ponemon regarding mobile device use?

    <p>Using personally-owned devices for work tasks.</p> Signup and view all the answers

    Which common vulnerability arises from failing to delete unnecessary information on computers?

    <p>Potential for data breaches.</p> Signup and view all the answers

    What action should be taken immediately if a USB drive containing confidential data is lost?

    <p>Notify the organization immediately.</p> Signup and view all the answers

    What is a consequence of leaving computers unattended in public spaces?

    <p>Increased chances of data theft.</p> Signup and view all the answers

    Which of the following is not considered an adversary route to information disclosure?

    <p>Automated software vulnerabilities</p> Signup and view all the answers

    What is the primary factor affecting the security of information in most companies?

    <p>The actions of the staff</p> Signup and view all the answers

    What type of risk is predominantly associated with information theft today?

    <p>Insider risk</p> Signup and view all the answers

    Which of the following is considered a countermeasure against interception of wireless communication?

    <p>Use of encryption technologies</p> Signup and view all the answers

    In the context of information security, what do insiders pose a risk of?

    <p>Malicious intent or inadvertent disclosure</p> Signup and view all the answers

    What two types of insiders might collaborate in information disclosure?

    <p>Insiders and outsiders</p> Signup and view all the answers

    What should organizations recognize about wireless communication in comparison to wired communications?

    <p>Wireless communication is inherently less secure</p> Signup and view all the answers

    What historical contract existed between employers and employees regarding security?

    <p>Loyalty for security</p> Signup and view all the answers

    What is one method that foreign intelligence services (FIS) may use to intercept communications?

    <p>Intercepting 100% of SMS messages and emails</p> Signup and view all the answers

    Which of the following methods is NOT typically used by foreign intelligence services for espionage?

    <p>Conducting open public demonstrations</p> Signup and view all the answers

    What is a tactic FIS might use during security trade shows?

    <p>Setting up booths as front companies</p> Signup and view all the answers

    One method FIS could use to gain access to sensitive data includes:

    <p>Using temporary research students for information gathering</p> Signup and view all the answers

    Which sector is particularly vulnerable to foreign intelligence services?

    <p>Critical national infrastructure (CNI)</p> Signup and view all the answers

    What could be a reason for FIS to conduct surreptitious entry?

    <p>To gather intelligence and access sensitive areas</p> Signup and view all the answers

    How might FIS attempt to gain information through corporate partnerships?

    <p>By proposing joint ventures or mergers</p> Signup and view all the answers

    Which of the following is a reported method of hacking employed by FIS?

    <p>Circumventing security software over Wi-Fi networks</p> Signup and view all the answers

    What is considered to be a more effective method of valuing regular assets than book value?

    <p>Criticality assessment</p> Signup and view all the answers

    What unique characteristic complicates the detection of information theft?

    <p>Theft often involves copying, sharing, or disclosing information</p> Signup and view all the answers

    Which factor is NOT commonly used to value information?

    <p>Historical significance of the information</p> Signup and view all the answers

    What can be a potential consequence of information theft for an organization?

    <p>Loss of clients and reputation damage</p> Signup and view all the answers

    Why is it complicated to take stock of an organization's information assets?

    <p>Most sensitive information exists in individuals' memories</p> Signup and view all the answers

    Which of the following is a consequence organizations face during and after an information incident?

    <p>Costs associated with notifying affected customers</p> Signup and view all the answers

    What aspect of information valuation poses challenges compared to regular asset valuation?

    <p>The inability to track the copy of stolen information</p> Signup and view all the answers

    What could be a significant indirect cost resulting from information theft for an organization?

    <p>Increased expenses for hiring data forensics specialists</p> Signup and view all the answers

    Which category of employees can be targeted by agents of FIS?

    <p>Support employees such as secretaries and technicians</p> Signup and view all the answers

    What is a primary characteristic of information brokers?

    <p>They blend into business settings and network with professionals</p> Signup and view all the answers

    What methods do information brokers use to obtain information?

    <p>Open-source gathering and targeted social engineering</p> Signup and view all the answers

    How can the tactics of information brokers be categorized?

    <p>Ethicality on a continuum from legitimate to deceitful methods</p> Signup and view all the answers

    Why might lower-ranking employees be more vulnerable to FIS manipulation?

    <p>Their lower pay and rank may make them susceptible to offers</p> Signup and view all the answers

    Where are information brokers likely to be found networking?

    <p>At professional conferences and seminars</p> Signup and view all the answers

    Which of the following suggests that information brokers can exploit vulnerabilities?

    <p>They can bypass traditional cybersecurity measures</p> Signup and view all the answers

    What is the role of the oil and gas industry concerning information brokers?

    <p>It is one of the sectors that suffers from information brokers</p> Signup and view all the answers

    Study Notes

    Introduction

    • Information and intellectual capital are more valuable to enterprises than physical assets.
    • Most organizations believe their information systems are secure, but in reality, they're not.

    Threats to Information

    • Adversaries relentlessly target sensitive data.
    • Methods include theft, solicitation, inadvertent disclosure, and hostile interception.
    • The internet, a crucial communication tool, is also a primary attack and espionage vector.
    • National borders and legal jurisdictions create significant challenges.
    • Foreign government agencies engage in significant espionage to gain economic advantage.
    • Industrial espionage exists between companies, even allies, with information theft as a central tactic.
    • Employees and ex-employees can easily steal trade secrets via flash drives or cloud uploads.

    Competitive Intelligence

    • Competitive intelligence (CI) involves market analysis, competitor profiling, and surveillance for company advantage.
    • A fine line exists between legitimate competitive analysis and illegal data acquisition.
    • Cyber sabotage, such as data corruption or denial of access, can harm operations more than theft.
    • The WannaCry ransomware attack crippled systems in over 150 countries.

    The CIA Triad

    • Confidentiality: Only authorized personnel can access information.
    • Integrity: Information is unaltered and accurate.
    • Availability: Authorized users have uninterrupted access to information.

    The Information Lifecycle

    • Information's value may change over its lifecycle.
    • Handwritten notes, for instance, can become digital files and be stored on various platforms.
    • Security should be maintained at every stage.

    Information Theft and the Law

    • Legal approaches to protecting information vary by jurisdiction (most notably between UK and US).
    • Intellectual Property (IP) protection includes patents, trademarks, and copyrights.
    • Protecting trade secrets is a significant legal concern.

    The Adversaries

    • Insider threats are common, and often more damaging than external ones.
    • Departing employees, who retain considerable company knowledge, represent a major risk category.
    • Disgruntled employees pose a significant risk.
    • Contract workers and partners can access and/or transfer information.

    The Insider Threat

    • Malicious insiders are current or former employees, or business partners with unauthorized access compromising information.
    • Reasons include financial gain, dispute with the company or desire to sabotage.
    • Insider threats are a considerable concern, particularly among those departing the organization.

    Operational Security (OpSec)

    • OpSec protects innocuous information that could reveal valuable organizational data.
    • Secure handling of documents, materials, and interactions is crucial during off-site activities and business dealings.
    • Careful planning, maintenance of documentation and regular audits and testing are required.

    Incident Response and Investigations

    • Preparing for a cybersecurity incident by outlining clearly defined roles and responsibilities is important.
    • Regular rehearsals and simulations will assist with preparedness and efficient crisis management.
    • Swift reporting and a thorough documentation process are key to incident resolution.

    Bibliography and Further Reading

    • A variety of sources (from government agencies and private institutions) are provided for more in- depth study.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz explores the critical aspects of information systems security and the threats they face. It discusses the value of intellectual capital over physical assets and examines various methods of data theft and espionage. Test your understanding of competitive intelligence and the challenges organizations face in safeguarding sensitive data.

    More Like This

    Use Quizgecko on...
    Browser
    Browser