Podcast
Questions and Answers
What is the primary function of a firewall?
What is the primary function of a firewall?
- To prevent unauthorized access to networks (correct)
- To encrypt sensitive data
- To monitor internal network traffic
- To detect malware on devices
Which of the following best describes an intrusion detection system?
Which of the following best describes an intrusion detection system?
- Hardware that stores backup data
- A system that monitors networks for unauthorized access (correct)
- Software that repairs damaged files
- A tool that encrypts data for secure transmission
What is the role of antivirus and antispyware software?
What is the role of antivirus and antispyware software?
- To prevent physical damage to computers
- To manage network traffic
- To backup data in case of loss
- To check for and eliminate malware (correct)
What does encryption do to plaintext?
What does encryption do to plaintext?
Which process is the reverse of encryption?
Which process is the reverse of encryption?
Why is continual updating important for antivirus and antispyware software?
Why is continual updating important for antivirus and antispyware software?
What field of study refers to encoded information?
What field of study refers to encoded information?
Which statement correctly describes ciphertext?
Which statement correctly describes ciphertext?
What best describes computer crime?
What best describes computer crime?
Which of the following represents a way in which computers can be the target of crime?
Which of the following represents a way in which computers can be the target of crime?
What is a primary challenge regarding wireless security?
What is a primary challenge regarding wireless security?
What does 'war driving' refer to in the context of wireless security?
What does 'war driving' refer to in the context of wireless security?
Which of the following is a common internet vulnerability?
Which of the following is a common internet vulnerability?
What is one potential risk of using email for communication?
What is one potential risk of using email for communication?
Why are fixed Internet addresses considered vulnerable?
Why are fixed Internet addresses considered vulnerable?
Which of the following is NOT a method through which computers can be used as instruments of crime?
Which of the following is NOT a method through which computers can be used as instruments of crime?
What is the expected annual loss due to user error, based on the data provided?
What is the expected annual loss due to user error, based on the data provided?
What is the probability of occurrence for power failure?
What is the probability of occurrence for power failure?
Which of the following is a focus of business continuity planning?
Which of the following is a focus of business continuity planning?
Which risk has the highest expected annual loss according to the data presented?
Which risk has the highest expected annual loss according to the data presented?
Which type of analysis is crucial in both disaster recovery planning and business continuity planning?
Which type of analysis is crucial in both disaster recovery planning and business continuity planning?
What role does identity management play in security policy?
What role does identity management play in security policy?
Based on the information given, which statement about embezzlement is true?
Based on the information given, which statement about embezzlement is true?
Which method is NOT considered a type of biometric authentication?
Which method is NOT considered a type of biometric authentication?
Why is it important for management to determine which systems to restore first?
Why is it important for management to determine which systems to restore first?
What is a key guideline for creating a secure password?
What is a key guideline for creating a secure password?
Which of the following is an example of two-factor authentication?
Which of the following is an example of two-factor authentication?
What is a potential risk of biometric authentication like fingerprint analysis?
What is a potential risk of biometric authentication like fingerprint analysis?
Which practice should be avoided to maintain password security?
Which practice should be avoided to maintain password security?
What characteristic makes a password easier to remember yet harder to guess?
What characteristic makes a password easier to remember yet harder to guess?
Why should a user not leave their computer logged in when away?
Why should a user not leave their computer logged in when away?
What is a fundamental reason for using a smart card in authentication?
What is a fundamental reason for using a smart card in authentication?
What is the primary purpose of general controls in information systems?
What is the primary purpose of general controls in information systems?
Which of the following describes application controls?
Which of the following describes application controls?
What aspect does the CIA Triad primarily focus on?
What aspect does the CIA Triad primarily focus on?
What is the role of identity management software in information security?
What is the role of identity management software in information security?
Which of the following best describes software patches?
Which of the following best describes software patches?
What is the main challenge associated with software patches?
What is the main challenge associated with software patches?
Which of the following options is an example of an input control?
Which of the following options is an example of an input control?
Which is NOT a component of general controls?
Which is NOT a component of general controls?
What is the primary role of spyware in a computer system?
What is the primary role of spyware in a computer system?
Which of the following best describes a cracker?
Which of the following best describes a cracker?
What is the definition of phishing in the context of computer crime?
What is the definition of phishing in the context of computer crime?
Which method is used in pharming attacks?
Which method is used in pharming attacks?
What is a 'back door' in the context of computer security?
What is a 'back door' in the context of computer security?
Spoofing is characterized by which of the following actions?
Spoofing is characterized by which of the following actions?
What does sniffing refer to in cyber security?
What does sniffing refer to in cyber security?
Identity theft entails which of the following actions?
Identity theft entails which of the following actions?
Flashcards
Computer Crime
Computer Crime
Any criminal act that uses technology as a tool for its execution, investigation, or prosecution.
Unauthorized Access
Unauthorized Access
An act of accessing a computer system without authorization, potentially leading to data breaches or unauthorized modifications.
Data Breach
Data Breach
The act of stealing confidential information stored on a computer system, often with the intention of gaining an advantage or causing harm.
Man-in-the-Middle Attack
Man-in-the-Middle Attack
Exploiting the open nature of the internet to intercept communication and steal sensitive data.
Signup and view all the flashcards
Communication Interception
Communication Interception
Unauthorized interception of communication over networks like email, P2P, or IM.
Signup and view all the flashcards
Fixed Target for Hackers
Fixed Target for Hackers
Using fixed Internet addresses, often associated with cable or DSL modems, to target and attack specific computer systems.
Signup and view all the flashcards
War Driving
War Driving
Identifying and gaining access to wireless networks by detecting SSIDs (service set identifiers) broadcast by access points.
Signup and view all the flashcards
Radio Frequency Vulnerability
Radio Frequency Vulnerability
The ease with which radio frequency bands used for wireless communication can be scanned and intercepted.
Signup and view all the flashcards
What is a firewall?
What is a firewall?
A combination of hardware and software designed to block unauthorized access to private networks.
Signup and view all the flashcards
What is packet filtering?
What is packet filtering?
A security technology used by firewalls to analyze incoming network traffic and block packets based on predefined rules.
Signup and view all the flashcards
What is an intrusion detection system?
What is an intrusion detection system?
A system that continuously monitors network activity for suspicious patterns and alerts administrators about potential security breaches.
Signup and view all the flashcards
What is antivirus software?
What is antivirus software?
Software designed to detect and remove malicious programs like viruses, worms, and Trojans from computer systems.
Signup and view all the flashcards
What is antispyware software?
What is antispyware software?
Software designed to detect and remove spyware, a type of malware that secretly monitors and collects user data.
Signup and view all the flashcards
What is cryptography?
What is cryptography?
The study of methods for encoding information to conceal its contents from unauthorized individuals.
Signup and view all the flashcards
Authentication
Authentication
A method of verifying a user's identity, typically using a combination of credentials like passwords or tokens.
Signup and view all the flashcards
What is encryption?
What is encryption?
The process of transforming plaintext into ciphertext using an encryption algorithm.
Signup and view all the flashcards
What is decryption?
What is decryption?
The process of transforming ciphertext back into plaintext using the corresponding decryption key.
Signup and view all the flashcards
Token
Token
A small physical device that generates a unique code used for login, enhancing security.
Signup and view all the flashcards
Smart card
Smart card
A card with a built-in memory chip that stores personal information, used for identification.
Signup and view all the flashcards
Biometric authentication
Biometric authentication
Using unique biological traits like fingerprints, voice patterns, or retinal scans for user verification.
Signup and view all the flashcards
Two-factor authentication
Two-factor authentication
A security measure that requires two separate forms of authentication to access a system, significantly increasing security.
Signup and view all the flashcards
Strong password
Strong password
A password that is easy to remember for you but difficult for others to guess.
Signup and view all the flashcards
Fingerprint analysis
Fingerprint analysis
A technique that uses fingerprint analysis to verify a user's identity, providing a more secure authentication method than usernames and passwords.
Signup and view all the flashcards
Preventing Unauthorized Access
Preventing Unauthorized Access
The process of safeguarding information systems and data against unauthorized access, modification, or destruction.
Signup and view all the flashcards
Spyware
Spyware
Software that secretly monitors your computer activities, often to steal personal information.
Signup and view all the flashcards
Key logger
Key logger
Spyware that records every keystroke you make, potentially revealing passwords and sensitive information.
Signup and view all the flashcards
Hacker
Hacker
An individual who attempts to gain unauthorized access to a computer system.
Signup and view all the flashcards
Cracker
Cracker
A hacker with criminal intent who aims to steal information or disrupt systems.
Signup and view all the flashcards
Identity theft
Identity theft
A crime where someone steals your personal information, like credit card details or social security number.
Signup and view all the flashcards
Phishing
Phishing
Setting up fake websites or sending emails that appear legitimate to trick people into revealing confidential information.
Signup and view all the flashcards
Pharming
Pharming
Redirecting users to a fake website, potentially stealing their logins or personal data.
Signup and view all the flashcards
Backdoor
Backdoor
A hidden way to access a system, typically used by hackers to bypass security measures.
Signup and view all the flashcards
General Controls
General Controls
General controls are safeguards that apply across all computerized applications within an organization. They ensure the security and integrity of computer programs, data files, and overall system operations.
Signup and view all the flashcards
Application Controls
Application Controls
Application controls are specific safeguards designed for individual software applications. They ensure the accuracy, completeness, and validity of data processed in each application.
Signup and view all the flashcards
Confidentiality
Confidentiality
Confidentiality refers to protecting sensitive information from unauthorized access. It ensures that only authorized individuals can view or modify the data.
Signup and view all the flashcards
Integrity
Integrity
Integrity ensures that data is accurate, complete, and reliable. It prevents unauthorized modifications and ensures the data remains trustworthy.
Signup and view all the flashcards
Availability
Availability
Availability ensures that information systems and data are readily accessible to authorized users when needed. This means the systems are up and running when required.
Signup and view all the flashcards
Software Patches
Software Patches
Software patches are small updates released by software developers to fix flaws or vulnerabilities in their programs. These patches help prevent attackers from exploiting weaknesses in the software.
Signup and view all the flashcards
Identity Management Software
Identity Management Software
Identity management software manages user identities and access rights within an organization. It tracks who has access to what, authenticates users, and controls their privileges.
Signup and view all the flashcards
Exploits
Exploits
Exploits are techniques or methods employed by attackers to take advantage of vulnerabilities in software systems. They exploit weaknesses to gain unauthorized access or disrupt system operations.
Signup and view all the flashcards
Online Order Processing Risk Assessment
Online Order Processing Risk Assessment
A method to assess the likelihood and potential impact of risks related to online orders.
Signup and view all the flashcards
Disaster Recovery Planning
Disaster Recovery Planning
A plan that outlines how to restore disrupted IT services following an unexpected event, like a power outage.
Signup and view all the flashcards
Business Continuity Planning
Business Continuity Planning
A plan designed to help an organization resume its critical business operations after a disruption.
Signup and view all the flashcards
Acceptable Use Policy (AUP)
Acceptable Use Policy (AUP)
A document that outlines the acceptable uses of an organization's IT resources and equipment.
Signup and view all the flashcards
Security Policy
Security Policy
A formal document that establishes a company's information security goals, their priorities, and the methods to achieve them.
Signup and view all the flashcards
Identity Management
Identity Management
The process of verifying the identity of users and controlling their access to information and systems.
Signup and view all the flashcards
Business Impact Analysis
Business Impact Analysis
A method used in disaster recovery and business continuity planning to determine the impact of an IT outage on the organization.
Signup and view all the flashcards
Expected Annual Loss
Expected Annual Loss
The potential cost of disruptions, such as power failures or user errors, during online order processing.
Signup and view all the flashcardsStudy Notes
ITM 100 Class 9: Securing Information Systems
- This class focuses on securing information systems.
- The study material is adapted from Management Information Systems: Managing the Digital Firm, 17th Edition by Kenneth C. Laudon and Jane P. Laudon.
Real World Example - TJX
- In 2006, TJX experienced a significant computer system security breach, affecting up to 94 million customers.
- Albert Gonzalez received a 20-year prison sentence in 2010 for his role in the TJX breach.
- The potential financial impact of the breach, according to federal guidelines, exceeded $400 million.
- The breaches began in 2005 with war-driving expeditions to identify vulnerable wireless networks.
- Hackers entered the TJX network, moved upstream to the corporate network, and installed a packet sniffer to capture transaction data.
- Authorities discovered 16.3 million stolen credit card numbers on Gonzalez's Latvian server and another 27.5 million on a server in Ukraine.
Real World Example - Heartland Payment Systems
- In March 2008, a breach exposed 134 million credit cards at Heartland Payment Systems.
- Albert Gonzalez and two unnamed Russian accomplices were indicted in 2009 and Gonzalez was sentenced to 20 years in prison.
- The vulnerability to SQL injection was known, with security analysts warning retailers well in advance, of the potential risks for years.
Top 10 Data Breaches (2008-2019)
- This section provides a list of the top 10 data breaches between 2008 and 2019.
- The companies included are Yahoo!, MySpace, Marriott, LinkedIn, Equifax, Heartland Payment Systems, Target, Capital One, Sony.
- Data is provided on the service, the company involved, and dates.
- Example: Yahoo!, Web services provider, 3000 million (2013)
System Security
- Information systems play a crucial role in many organizations and are extremely vulnerable.
- System failures can significantly impact a firm's business functions and profitability.
- Critical organizational data, like confidential information, trade secrets, and new products are at risk if security measures are insufficient.
- Security breaches can dramatically reduce a company's market value and lead to liability issues.
Why Systems Are Vulnerable
- Hardware issues such as breakdowns, misconfigurations, and improper use can cause system vulnerabilities.
- Software flaws and programming errors, installation problems, and unauthorized modifications are another threat to system security.
- Systems located outside of a firm’s control also increase vulnerabilities.
Software Vulnerability
- Commercial software often has bugs (code defects).
- Achieving zero defects in software is not always possible due to the complexity of large programs.
- Security vulnerabilities frequently exist that enable intrusions. Buffer overflow is an example with such vulnerabilities.
Computer Crime
- Illegal acts against computer systems or using computers to commit crimes are considered computer crimes.
- Gaining unauthorized access, breaching confidentiality of data, or stealing trade secrets are all types of computer-related violations.
Internet Vulnerabilities
- The openness of the internet makes it susceptible to attacks like interception, person-in-the-middle attacks, malicious software, etc.
- The sheer size of the internet means a successful attack can have widespread impact.
Wireless Security Challenges
- The radio frequency spectrum used for wireless communication is easily accessible to eavesdroppers.
- Service set identifiers (SSIDs) can be easily detected through tools like sniffer programs.
- War-driving attempts to identify unprotected or vulnerable wireless networks.
Malicious Software
- Malicious software, often abbreviated as malware, comes in several forms, including viruses, worms, and Trojans.
- This software can cause damage to computers.
Computer Viruses
- Viruses are designed to attach to other programs to execute unauthorized functions.
- They replicate and spread to other programs and computers, sometimes by email attachments. - They can cause data damage and theft.
Worms
- Worms replicate themselves across networks to spread across multiple computer systems.
- They don't require an active host program to run, unlike a Virus.
Trojan Horses
- Trojan horse programs often appear benign initially then carry out harmful actions.
- They frequently spread viruses or malware.
SQL Injection, Spyware
- Hackers use SQL injection attacks against database-driven applications. These attacks use maliciously crafted data submitted in web forms to execute unauthorized commands against databases.
- Spyware includes keyloggers, applications that record user keystrokes to capture sensitive data.
Hackers and Computer Crime
- Hackers are those individuals who attempt to gain unauthorized access to computer systems.
- Crackers are a subset of hackers with malicious intent.
Computer Crime (Continued)
- Identity theft, password guessing, phishing, and pharming are fraudulent activities that involve unauthorized access to personal information, which poses a significant threat.
Spoofing and Sniffing
- Spoofing includes masquerading as another person or redirecting web links to unintended destinations.
- Sniffing is a passive attack that observes data traveling across a network, enabling hackers to steal data like emails and company files.
Denial of Service (DoS) Attacks
- Hackers flood a computer system with extraneous communication to crash the service.
- Distributed DoS attacks utilize many computers to overwhelm the system.
- Botnets are often employed in DoS attacks: networks of compromised computer systems that carry out malicious activities on command from the attacker.
Internal Threats: Employees
- Security threats originate from within organizations, such as through insiders with inside knowledge.
- Sloppy security practices and inadequate user training can cause weaknesses.
- Social engineering tricks employees into revealing passwords or other sensitive data.
- Information systems specialists and end users alike are points of weakness.
Contemporary Security Challenges and Vulnerabilities
- Network security vulnerabilities can arise from numerous sources, including unauthorized access, tapping, message alteration, and radiation.
Security and Controls
- Security measures, encompassing policies and procedures, are steps taken to prevent unauthorized access, damage to data, and theft.
Information Systems Controls
- Controls are procedures employed over the entire organization's information systems, such as general controls, which address systems design or application controls which pertain to specific applications.
CIA Triad of Information Security
- Confidentiality, Integrity, and Availability (CIA) are the three pillars of information security: Confidentiality ensures data stays secret; Integrity ensures data's accuracy and reliability; Availability ensures authorized users can access data when needed.
Tools and Technologies for Safeguarding Information Systems
- Software patches address flaws in software programs.
- Identity management software helps manage user accounts and access privileges.
- Authentication methods such as password systems, tokens, smart cards, and biometric systems control access to sensitive information. Tools such as firewalls block unauthorized users. Intrusion detection systems monitor potential threats. Antivirus software checks for and removes malware.
Preventing Unauthorized Access
- Guidelines for passwords should be easy to remember but hard to guess. This advice includes mixing upper and lowercase letters, numbers, and special characters to avoid simple guessing tactics.
Risk Assessment
- Risk assessments are crucial to determine the probability and potential cost of system vulnerabilities.
- Risk assessment considers types of threats, potential losses, and expected annual losses.
Online Order Processing Risk Assessment
- An example demonstrates classifying exposure to risk with probability of occurrence and loss ranges.
Security Policy
- Security policies outline appropriate security goals, acceptable use policies, and computing equipment standards.
Disaster Recovery Planning and Business Continuity Planning
- Disaster recovery plans aim to restore disrupted services after a disaster.
- Business continuity plans address continuing business operations after a major disruption.
The Role of Auditing
- Information systems audits evaluate the organization’s overall security posture.
- Security audits review technologies, procedures, documentation, training, and personnel.
- Auditors can simulate disaster scenarios to test response capabilities.
Sample Auditor's List of Control Weaknesses
- This is an example of findings from an information systems audit.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.