Podcast
Questions and Answers
Which component of an information system is primarily responsible for executing applications and storing data?
Which component of an information system is primarily responsible for executing applications and storing data?
- Hardware (correct)
- Procedures
- Software
- Networks
What is a primary challenge associated with securing the software component of an information system?
What is a primary challenge associated with securing the software component of an information system?
- Lack of user access controls
- Inaccessibility of data
- Errors in software programming (correct)
- Physical damage to hardware
Which of the following is considered a traditional tool of physical security for protecting hardware?
Which of the following is considered a traditional tool of physical security for protecting hardware?
- Firewalls
- Locks and keys (correct)
- Software encryption
- Digital user access controls
How does the information technology industry often treat information security during software development?
How does the information technology industry often treat information security during software development?
What is one of the critical components that enables information to be processed and stored within an information system?
What is one of the critical components that enables information to be processed and stored within an information system?
Which of the following methods is most commonly used to enforce copyright laws?
Which of the following methods is most commonly used to enforce copyright laws?
What result can a breach of physical security lead to within an information system?
What result can a breach of physical security lead to within an information system?
What is considered a form of availability disruption?
What is considered a form of availability disruption?
Which component of an information system includes applications and operating systems?
Which component of an information system includes applications and operating systems?
What risk does an organization face when relying on a web hosting provider?
What risk does an organization face when relying on a web hosting provider?
Which of the following can lead to deviations in quality of service for an organization?
Which of the following can lead to deviations in quality of service for an organization?
What often limits the security measures taken during the development of software in an information system?
What often limits the security measures taken during the development of software in an information system?
What are service level agreements (SLAs) most often linked with?
What are service level agreements (SLAs) most often linked with?
What might result from a service provider failing to meet SLA terms?
What might result from a service provider failing to meet SLA terms?
Which of these can cause interruptions to an organization's information systems?
Which of these can cause interruptions to an organization's information systems?
Which of the following best describes a situation of degraded service?
Which of the following best describes a situation of degraded service?
What is the primary role of the champion in an information security project team?
What is the primary role of the champion in an information security project team?
Which role in the information security project team is responsible for understanding organizational culture and policies?
Which role in the information security project team is responsible for understanding organizational culture and policies?
Who among the following is primarily responsible for administering systems that house information?
Who among the following is primarily responsible for administering systems that house information?
What is the main responsibility of data owners in an organization?
What is the main responsibility of data owners in an organization?
Which role directly works with data owners to manage information and systems?
Which role directly works with data owners to manage information and systems?
End users in the project team serve what important function?
End users in the project team serve what important function?
What skills are essential for a team leader in an information security project?
What skills are essential for a team leader in an information security project?
Which of the following best describes the role of risk assessment specialists?
Which of the following best describes the role of risk assessment specialists?
What is a common characteristic of forces of nature?
What is a common characteristic of forces of nature?
Which of the following is a measure organizations should implement to manage threats from forces of nature?
Which of the following is a measure organizations should implement to manage threats from forces of nature?
What term is used to refer to events that may include natural disasters as well as civil disorder?
What term is used to refer to events that may include natural disasters as well as civil disorder?
Which of the following actions can help reduce the likelihood of human error in organizations?
Which of the following actions can help reduce the likelihood of human error in organizations?
In what way can employees pose a threat to information security?
In what way can employees pose a threat to information security?
What is information extortion?
What is information extortion?
Which of the following scenarios could be considered an example of human error or failure?
Which of the following scenarios could be considered an example of human error or failure?
What is a significant danger posed by human errors in an organization?
What is a significant danger posed by human errors in an organization?
What distinguishes pharming from phishing attacks?
What distinguishes pharming from phishing attacks?
What is a primary danger of unauthorized packet sniffers?
What is a primary danger of unauthorized packet sniffers?
What is the primary function of VirtualBox Guest Additions?
What is the primary function of VirtualBox Guest Additions?
How does a man-in-the-middle attack work?
How does a man-in-the-middle attack work?
What typically triggers a phishing attack?
What typically triggers a phishing attack?
What is the first step to import an .ova file in VirtualBox?
What is the first step to import an .ova file in VirtualBox?
What is a fundamental function of a packet sniffer?
What is a fundamental function of a packet sniffer?
After selecting the .ova file for import, what does VirtualBox do next?
After selecting the .ova file for import, what does VirtualBox do next?
What should a user do if a Windows guest does not automatically start the Guest Additions installer?
What should a user do if a Windows guest does not automatically start the Guest Additions installer?
What technique does spoofing employ in unauthorized access?
What technique does spoofing employ in unauthorized access?
What is the role of DNS cache poisoning in pharming attacks?
What is the role of DNS cache poisoning in pharming attacks?
Which of the following best describes successful organizations' approach to security?
Which of the following best describes successful organizations' approach to security?
What is one of the risks associated with clear text data transmissions on local networks?
What is one of the risks associated with clear text data transmissions on local networks?
Information security is defined as what?
Information security is defined as what?
Which of the following is NOT considered a layer of security in an organization?
Which of the following is NOT considered a layer of security in an organization?
How are information security and social science related?
How are information security and social science related?
Flashcards
Information System (IS)
Information System (IS)
The entire collection of software, hardware, data, people, procedures, and networks used to manage information within an organization.
Hardware
Hardware
The physical components of an IS, including computers, servers, routers, and other devices.
Software
Software
The programs and instructions that tell the hardware what to do, including operating systems, applications, and utilities.
Network
Network
Signup and view all the flashcards
People
People
Signup and view all the flashcards
Procedures
Procedures
Signup and view all the flashcards
Data
Data
Signup and view all the flashcards
Information Security
Information Security
Signup and view all the flashcards
Copyright Enforcement Mechanisms
Copyright Enforcement Mechanisms
Signup and view all the flashcards
End User License Agreement (EULA)
End User License Agreement (EULA)
Signup and view all the flashcards
Deviations in Quality of Service
Deviations in Quality of Service
Signup and view all the flashcards
Availability Disruption
Availability Disruption
Signup and view all the flashcards
Threats to Internet Service
Threats to Internet Service
Signup and view all the flashcards
Service Level Agreement (SLA)
Service Level Agreement (SLA)
Signup and view all the flashcards
Communications and Service Provider Issues
Communications and Service Provider Issues
Signup and view all the flashcards
Fines for SLA Violations
Fines for SLA Violations
Signup and view all the flashcards
Champion
Champion
Signup and view all the flashcards
Team Leader
Team Leader
Signup and view all the flashcards
Security Policy Developers
Security Policy Developers
Signup and view all the flashcards
Risk Assessment Specialists
Risk Assessment Specialists
Signup and view all the flashcards
Security Professionals
Security Professionals
Signup and view all the flashcards
Systems Administrators
Systems Administrators
Signup and view all the flashcards
End Users
End Users
Signup and view all the flashcards
Data Owners
Data Owners
Signup and view all the flashcards
Data Custodians
Data Custodians
Signup and view all the flashcards
Forces of Nature
Forces of Nature
Signup and view all the flashcards
Human Error or Failure
Human Error or Failure
Signup and view all the flashcards
Information Extortion
Information Extortion
Signup and view all the flashcards
Disaster Recovery Plans
Disaster Recovery Plans
Signup and view all the flashcards
Business Continuity Plans
Business Continuity Plans
Signup and view all the flashcards
Incident Response Plans
Incident Response Plans
Signup and view all the flashcards
Double Entry
Double Entry
Signup and view all the flashcards
Two-Party Verification
Two-Party Verification
Signup and view all the flashcards
Spoofing
Spoofing
Signup and view all the flashcards
Man-in-the-Middle Attack
Man-in-the-Middle Attack
Signup and view all the flashcards
Pharming
Pharming
Signup and view all the flashcards
Packet Sniffer
Packet Sniffer
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Session Hijacking
Session Hijacking
Signup and view all the flashcards
DNS Cache Poisoning
DNS Cache Poisoning
Signup and view all the flashcards
Address Spoofing
Address Spoofing
Signup and view all the flashcards
Guest Additions
Guest Additions
Signup and view all the flashcards
Security Layers
Security Layers
Signup and view all the flashcards
Virtual Appliance Import
Virtual Appliance Import
Signup and view all the flashcards
Protection vs. Availability
Protection vs. Availability
Signup and view all the flashcards
Threat Analysis
Threat Analysis
Signup and view all the flashcards
Recovery
Recovery
Signup and view all the flashcards
Study Notes
Module 1 Goals
- Students must be able to identify key terms in information security
- Identify the components of an information system
- Describe information security as an art or science
- Describe the need for information security in an organization
- Identify different threats and attacks on information systems
Focal Points
- The module provides a foundation for understanding information security, defining key terms, concepts, and the origins of the field
- Security, as an art, lacks hard and fast rules for implementing security mechanisms
- Security, as a science, acknowledges that specific scientific conditions cause most actions in computer systems. Security, as a social science, examines how individuals interact with systems.
Lessons
- Lesson 1: Introduction to Information Assurance and Security (p. 4)
- Lesson 2: Need for Security (p. 17)
- Lesson 3: Threats and Attacks (p. 20)
- Lesson 4: Virtual Laboratory Environment (p. 36)
Understanding Information Assurance and Information Security
- Cyberattacks and data loss pose constant threats to digital information
- Information assurance and information security are common methods to prevent cyberattacks
- Information is any representation of knowledge in various forms, as defined by NIST
Information Assurance
- Information assurance protects and defends information and systems by ensuring availability, integrity, authentication, confidentiality, and non-repudiation.
- Measures include protection, detection, and reaction capabilities
- The five pillars of information assurance apply depending on the sensitivity of information systems
Understanding Components of an Information System
- Information systems (IS) comprise software, hardware, data, people, procedures and networks for accessing information
- The six critical components enable input, processing, output, and storage of information.
Components of an information system
- People resources
- Data and knowledge bases
- Data resources
- Software resources
- Hardware resources
- Network resources
Computer Security vs Information Security
- Computer security focuses on securing the physical location of computer systems, while information security focuses on protecting and preserving information from loss within an organization.
- Physical, personal, operations, communication and information security are multiple layers required for securing organizational assets
- Organizational security is a combination of protecting people, data, procedures and networks.
Cyber Security
- Cybersecurity is the ability to protect cyberspace against attacks and unauthorized use.
- Cybersecurity involves a range of technologies focused on preventing attacks and defending against unauthorized use of computer systems.
- Cyber-security is used in private and governmental sectors.
Business Needs First
- Data security is frequently used as a substitute for information security, focusing on protecting data and information regardless of state (at rest, in processing or in transit).
- Information security functions include: protecting an organization's ability to function, protecting the data and information an organization collects, enabling safe operation of applications running on IT systems, and safeguarding the organization's technology assets
- Protecting the functionality, data, security in operations and assets are four areas where information security needs to manage risks
Threats and Attacks
- Cybercrime involves criminal activity targeting computer systems, networks, or devices for malicious purposes like profit generation.
- Cybercriminals or hackers often perform cybercrimes to generate profit.
- Cybercriminals utilize techniques like social engineering, hacking, rogue employee activities, phishing, spear phishing and ransom attacks to compromise systems.
Types of Cyber Criminals
- Social Engineer- tricks unsuspecting employees to compromise data
- Hacker- hacks computers without clear criminal reason
- Rogue Employee- disgruntled employees, posing an insider threat to data security
- Spear Phisher- pretends to be a legitimate email sender to compromise data
- Ransom Artist- exerts pressure on the victim to pay a sum of money to regain access to their data
Introduction to Virtual Laboratory Environment
- VirtualBox is a powerful virtualization tool used in home and enterprise systems.
- Supported operating systems include Windows, Linux, macOS, and others
- VirtualBox supports virtual network connections including NAT, bridged, host-only, internal and generic networking
Key Terms
- Security Triangle
- Information System (IS).
- Computer Security.
- Information security
- Threat
- Vulnerability
- Hacker
- Cracker
- Phreaker
- Malware
- Virus
- Worm
- Trojan Horse
- Back Door
- Bot
- Denial-of-service (DoS)
- Distributed Denial-of-service (DDoS)
- Mail Bomb
- Spam
- Packet Sniffer
- Man-in-the-middle
- Pharming
- Spoofing
- Theft
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.