Podcast
Questions and Answers
What key characteristic of information refers to it being accessible by authorized users?
What key characteristic of information refers to it being accessible by authorized users?
- Utility
- Integrity
- Confidentiality
- Availability (correct)
Information security is solely focused on network security and does not include physical or personnel security.
Information security is solely focused on network security and does not include physical or personnel security.
False (B)
In the context of information security, what does the acronym C.I.A. stand for?
In the context of information security, what does the acronym C.I.A. stand for?
Confidentiality, Integrity, and Availability
The principle of ensuring that information remains whole, complete, and uncorrupted is known as ________.
The principle of ensuring that information remains whole, complete, and uncorrupted is known as ________.
Match the following roles with their responsibilities in data management:
Match the following roles with their responsibilities in data management:
What is the primary role of a Chief Information Security Officer (CISO) within an organization?
What is the primary role of a Chief Information Security Officer (CISO) within an organization?
A 'threat' in information security refers only to intentional actions by malicious actors.
A 'threat' in information security refers only to intentional actions by malicious actors.
Define what is an 'asset' in the context of information security.
Define what is an 'asset' in the context of information security.
A(n) ________ is a specific instance of a general threat that could exploit a vulnerability.
A(n) ________ is a specific instance of a general threat that could exploit a vulnerability.
Match the risk management term with its description:
Match the risk management term with its description:
Which of the following best describes 'defense in depth'?
Which of the following best describes 'defense in depth'?
A security perimeter is sufficient to protect against both external and internal attacks.
A security perimeter is sufficient to protect against both external and internal attacks.
What is the purpose of implementing redundancy in an information security strategy?
What is the purpose of implementing redundancy in an information security strategy?
The boundary that defines the outer limits of an organization's security efforts is known as the __________.
The boundary that defines the outer limits of an organization's security efforts is known as the __________.
Match the threat perspective with the correct definition:
Match the threat perspective with the correct definition:
What is a 'Spike', as it relates to power irregularities?
What is a 'Spike', as it relates to power irregularities?
A computer virus is a type of malicious code that replicates and spreads without requiring a host program.
A computer virus is a type of malicious code that replicates and spreads without requiring a host program.
What is the primary characteristic of a polymorphic computer worm?
What is the primary characteristic of a polymorphic computer worm?
________ involves bypassing access controls by attempting to guess passwords.
________ involves bypassing access controls by attempting to guess passwords.
Match the password attack type with its description:
Match the password attack type with its description:
What is the main characteristic of a Denial-of-Service (DoS) attack?
What is the main characteristic of a Denial-of-Service (DoS) attack?
A Distributed Denial-of-Service (DDoS) attack originates from a single source IP address.
A Distributed Denial-of-Service (DDoS) attack originates from a single source IP address.
Define what is 'spoofing' in the context of network security.
Define what is 'spoofing' in the context of network security.
In a ________ attack, the attacker intercepts and modifies packets between two communicating parties.
In a ________ attack, the attacker intercepts and modifies packets between two communicating parties.
Match the email attack to its description:
Match the email attack to its description:
What is the primary function of a 'sniffer' in network security?
What is the primary function of a 'sniffer' in network security?
Sniffers are easily detectable on a network due to their high bandwidth consumption.
Sniffers are easily detectable on a network due to their high bandwidth consumption.
Briefly explain the goal of social engineering.
Briefly explain the goal of social engineering.
________ involves creating a fabricated scenario to trick someone into providing information.
________ involves creating a fabricated scenario to trick someone into providing information.
Match the social engineering technique with its corresponding description:
Match the social engineering technique with its corresponding description:
What happens in a Buffer Overflow attack?
What happens in a Buffer Overflow attack?
Information security is a one-time implementation process with a defined end state.
Information security is a one-time implementation process with a defined end state.
What does an 'attack' represent in the context of information security?
What does an 'attack' represent in the context of information security?
A main component for securing the systems that businesses use are __________ and network security.
A main component for securing the systems that businesses use are __________ and network security.
Match the term to its definition and purpose:
Match the term to its definition and purpose:
According to TVA Triple, what three components are used in cyber risk assessment?
According to TVA Triple, what three components are used in cyber risk assessment?
The definition of vulnerability is any potential danger that can exploit to harman an asset.
The definition of vulnerability is any potential danger that can exploit to harman an asset.
What is the calculation for the level of risk, according to the slides?
What is the calculation for the level of risk, according to the slides?
Anything of value to an organization is a definition of an ______.
Anything of value to an organization is a definition of an ______.
Match the term in the TVA triple to its correct definition:
Match the term in the TVA triple to its correct definition:
Flashcards
Information security (InfoSec)
Information security (InfoSec)
Protecting information and its critical elements using systems and hardware for storage and transmission.
Critical characteristics of information
Critical characteristics of information
Availability, accuracy, authenticity, confidentiality, integrity, utility, and possession.
McCumber Cube
McCumber Cube
A 3x3x3 cube model with 27 cells that represent areas to secure information systems.
Threat
Threat
Signup and view all the flashcards
Asset
Asset
Signup and view all the flashcards
Attack
Attack
Signup and view all the flashcards
Well-known vulnerability
Well-known vulnerability
Signup and view all the flashcards
Exploit
Exploit
Signup and view all the flashcards
Security Terms
Security Terms
Signup and view all the flashcards
Risk
Risk
Signup and view all the flashcards
Risk management
Risk management
Signup and view all the flashcards
Risk appetite
Risk appetite
Signup and view all the flashcards
Residual risk
Residual risk
Signup and view all the flashcards
Security perimeter
Security perimeter
Signup and view all the flashcards
Defense in depth
Defense in depth
Signup and view all the flashcards
Redundancy
Redundancy
Signup and view all the flashcards
TVA Triple
TVA Triple
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Ways to view threats
Ways to view threats
Signup and view all the flashcards
Power irregularities
Power irregularities
Signup and view all the flashcards
Malicious code
Malicious code
Signup and view all the flashcards
Polymorphic
Polymorphic
Signup and view all the flashcards
Cracking (passwords)
Cracking (passwords)
Signup and view all the flashcards
Brute force attack
Brute force attack
Signup and view all the flashcards
Dictionary attack
Dictionary attack
Signup and view all the flashcards
Denial-of-service (DoS)
Denial-of-service (DoS)
Signup and view all the flashcards
Distributed denial-of-service (DDoS)
Distributed denial-of-service (DDoS)
Signup and view all the flashcards
Spoofing
Spoofing
Signup and view all the flashcards
Man-in-the-middle
Man-in-the-middle
Signup and view all the flashcards
E-mail attacks
E-mail attacks
Signup and view all the flashcards
Sniffer
Sniffer
Signup and view all the flashcards
Social engineering
Social engineering
Signup and view all the flashcards
Buffer overflow
Buffer overflow
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Pretexting
Pretexting
Signup and view all the flashcards
Baiting
Baiting
Signup and view all the flashcards
Tailgating
Tailgating
Signup and view all the flashcards
Quid Pro Quo
Quid Pro Quo
Signup and view all the flashcards
Study Notes
Objectives
- Information security component parts generally and specifically for network security will be explained.
- Important terms and ideas about information and network security will be defined.
- The roles of information and network security people in organizations will be defined.
- Why information and network security are important for businesses will be discussed.
- Threats to information and network security, and common attacks related to them will be identified.
- Differences between threats and attacks to information inside systems will be highlighted.
Introduction
- Network security is a very important thing for almost all organizations.
- Perimeter defense is very important for most network security plans.
- It is essential to have a firewall that works well and is set up correctly.
- Chapter 1 gives general information about information security.
- The chapter also explains how the wider scope of information security affects current changes in network security.
What Is Information Security?
- Information security (InfoSec) protects data and everything important to it.
- This involves the systems and equipment used to handle that information.
- It is a combined approach that includes:
- Network security
- Physical security
- Personnel security
- Operations security
- Communications security
C.I.A. Triangle
- The CIA triangle is the industry standard for computer security.
- It focuses on three data features which are valuable to organizations:
- Confidentiality
- Integrity
- Availability
Critical Characteristics of Information
- Availability: Data can be accessed by authorized users.
- Accuracy: Data is correct and free of errors.
- Authenticity: Data is real and original.
- Confidentiality: Data is protected from being exposed or shared.
- Integrity: Data remains complete and unchanged.
- Utility: Data has value for a specific reason.
- Possession: Data is owned or controlled by someone.
CNSS Security Model
- U.S. Committee on National Systems Security (CNSS) is the group
- National Training Standard for Information Security Professionals NSTISSI No. 4011 is also related.
- McCumber Cube is a 3x3x3 cube.
- It has 27 sections that show different areas that need to be protected in today's information systems.
Balancing Information Security and Access
- Information security should be a continuous process.
- It is important to balance protecting data and information assets with making that data available to those who are authorized.
- Security should allow people to access as appropriate.
- Security should protect from threats.
Business Needs First
- It is important to protect the organization's ability to operate.
- It is vital to enable applications to operate safely on the organization's IT systems.
- It is necessary to protect the data that the organization collects and uses.
- Need to protect the technology assets the organization uses.
Security Professionals and the Organization
- Several professionals support the complex information security program needed by a moderate or large organization.
- The chief information officer (CIO) is a senior technology officer.
- The chief information security officer (CISO):
- Is responsible for ensuring information security is assessed, managed, and implemented in the organization.
Information Security Project Team
- Champion
- Team leader
- Security policy developers
- Risk assessment specialists
- Security professionals
- Systems, network, and storage administrators
- End users
Data Management
- Data owners: Take responsibility to ensure the security of particular information and how it is used.
- Data custodians: Take responsibility to store, maintain, and protect information.
- Data users: Given permission by the data owner to use and access data as necessary for their daily tasks.
Key Information Security Terminology
- Security experts need to understand common terms.
- Necessary to effectively support information security work.
Threats and Attacks
- Threat: Anything that could cause harm to an asset.
- Asset: Anything an organization values.
- Can be physical or logical.
- Attack: Something done on purpose or by accident that could change, damage, or lose an information asset without permission.
- Subject of an attack: Active tool used to conduct the attack.
- Object of an attack: Entity being attacked.
- Direct attack: A hacker using a personal computer to break into a system.
- Indirect attack: A system is compromised and used to attack other systems.
Vulnerabilities and Exploits
- Threat agent: One specific case of a general threat.
- Well-known vulnerabilities: Examined, documented, and published vulnerabilities.
- "Exploit": When threat agents try to use weakness in a system or information asset.
- Attackers create recipes to formulate an attack.
- Controls, safeguards, or countermeasures:
- Synonymous terms
- Security steps, rules, or processes that successfully fight attacks, reduce risk, fix weak spots, and make security better in an organization.
Risk
- Risk is the state of being unsecure, either partially susceptible to attack.
- Expressed in terms of the likelihood of an event occurring.
- Risk management: includes finding risks, assessing or analyzing risks, and controlling risks.
- Risk appetite/tolerance: How much risk an organization is willing to accept.
- Residual risk: The amount of risk left after taking precautions, implementing controls, and performing other security activities.
- Controlling risk:
- Self-protection
- Risk transfer
- Self-insurance or acceptance
- Avoidance
Security Perimeter and Defense in Depth
- Security perimeter:
- Boundary between the outer limit of an organization's security and the beginning of the outside network
- Does not protect against internal attacks
- Organization may choose to set up security domains
- Defense in depth:
- Layered implementation of security
- Redundancy:
- Implementing technology in layers
Threats to Information Security
- Cybersecurity Ventures said the global annual cost of cybercrime will be 9.5 trillion USD in 2024.
- Damages from cybercrime are expected to cost $10.5 trillion by 2025.
Threats to Information Security in Malaysia
- The Cyber Incident Quarterly Summary Report Q4 2024 gives an overview of computer security incidents handled by the Cyber999 Incident Response Centre of CyberSecurity Malaysia in Q4 2024.
The TVA Triple
- The "TVA Triple" stands for Threat-Vulnerability-Asset.
- A foundational model in cyber risk assessment used to understand and evaluate potential risks to information systems.
Threat Definition
- Any potential danger that can exploit a vulnerability to harm an asset.
- Examples include: Malware, phishing attacks, insider threats, and natural disasters.
Vulnerability Definition
- A weakness or flaw in a system that can be exploited.
- Examples include: unpatched software, weak passwords, and misconfigured firewalls.
Asset Definition
- Anything of value to an organization, like data, systems, networks, and people.
- Includes customer data, servers, intellectual property, and cloud infrastructure.
- Threat exploits a Vulnerability to comprise an Asset
- Risk = Threat × Vulnerability × Asset Value
- Organize in a TVA worksheet
Other Ways to View Threats
- Perspectives:
- Intellectual property
- Software piracy
- Shoulder surfing
- Hackers
- Script kiddies
- Packet monkeys
- Cracker
- Phreaker
- Hacktivist or cyberactivist
- Cyberterrorist
- Malicious code, malicious software, or malware
- Computer virus: macro virus, boot virus
- Worms
- Trojan horses
- Backdoor, trapdoor, maintenance hook
- Rootkit
- Power irregularities
- Spike: A sudden, short-duration increase in voltage, often lasting a few microseconds. Can be caused by lightning strikes, switching loads, or electromagnetic interference.
- Surge: A temporary and relatively longer overvoltage than a spike, lasting a few milliseconds; can damage sensitive electronic equipment if not regulated.
- Sag: A short-term drop in voltage levels, typically lasting from milliseconds to a few seconds.
- Brownout: A prolonged period of reduced voltage, often lasting minutes or hours.
- Fault: An abnormal electrical current due to issues like short circuits, ground faults, or line-to-line contact.
- Blackout: A complete loss of power in an area, often unexpected and of varying duration.
Attacks on Information Assets
- Attacks occur through a specific act that may cause a potential loss.
- Includes each of the major types of attack used against controlled systems.
Malicious Code
- Malicious code
- Includes viruses, worms, Trojan horses, and active Web scripts
- Executed with the intent to destroy or steal information
- Polymorphic, multivector worm
- Constantly changes the way it looks
- Uses multiple attack vectors to exploit a variety of vulnerabilities in commonly used software
Vectors For Spreading Malicious Code
- IP scan and attack
- Web browsing
- Virus
- Unprotected shares
- Mass mail
- Simple Network Management Protocol (SNMP)
Compromising Passwords
- Controls bypassed by guessing passwords.
- Cracking:
- Attempting to guess a password
- Brute force attack:
- Application of computing and network resources to try every possible combination of options
- Dictionary attack:
- Variation on the brute force attack
- Field narrowed by selecting specific target accounts and using a list of commonly used passwords
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
- Denial-of-service (DoS) attack
- Attacker sends a large number of connection or information requests to a target
- Target system receives too many requests.
- Distributed denial-of-service (DDoS):
- Coordinated stream of requests against a target from many locations at the same time
- Any system connected to the Internet is a potential target for denial-of-service attacks
Spoofing
- Intruder sends messages to IP addresses that indicate to the recipient that the messages are coming from a trusted host
Man-in-the-Middle
- Attacker monitors packets from the network
- Modifies them using IP spoofing techniques
- Inserts them back into the network
- Attacker is able to eavesdrop, change, redirect data, forge, or divert data
E-mail Attacks
- E-mail is the vehical.
- Spam is a means to make malicious code attacks more effective.
- Mail bomb:
- Routes large amounts of e-mail to the target system.
Sniffers
- Programs or devices that monitors data traveling over a network.
- Sniffers can be used for good security practices or stealing information.
- Mostly impossible to detect
- Can be inserted almost anywhere
- Packet sniffers work on TCP/IP networks.
Social Engineering
- Process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.
- Common techniques
- Phishing: Deceptive emails tricking users into clicking links or providing info.
- Pretexting: Creating a fabricated scenario to obtain information.
- Baiting: Offering something enticing (e.g., USB drive with malware).
- Tailgating: Physically following someone into a secure area.
- Quid Pro Quo: Offering a service in exchange for information.
Buffer Overflow
- Application error:
- Occurs when more data is sent to a buffer than it can handle
- Attacker is able to get intended target system to execute specific instructions
- Attacker can take advantage of some other unintended consequence of the failure
Summary
- Firewalls and network security are essential for securing the systems that businesses use
- Information security is protection of information and its critical elements
- Information security is a process, not a goal
- Range of professionals support the information security program
- Treat: object, person, or other entity that represents a constant danger to an asset
- Attack: act that takes advantage of a vulnerability to compromise a controlled system
- Organization must establish a functional and well-designed information security program
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.