Principles of Security - Topic 2
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is an attack in the context of information security?

  • A routine maintenance task performed by IT
  • A collaborative effort to enhance system performance
  • An intentional or unintentional act that can damage information (correct)
  • A software update to improve system security

Which of the following best describes the role of the IT department in managing attacks?

  • Implementing non-technical changes across the organization
  • Conducting regular offensive security tests
  • Coordinating responses to threats and attacks (correct)
  • Monitoring and reporting all organizational communications

Which statement is NOT true regarding attacks in information systems?

  • They can cause damage to information and supportive systems
  • They solely refer to malicious software deployments (correct)
  • They can be both intentional and unintentional
  • They involve various methods to compromise systems

What is a potential consequence of an attack on information systems?

<p>Loss of data integrity and confidentiality (D)</p> Signup and view all the answers

How should organizations ideally address threats and attacks?

<p>By coordinating closely with the IT department (A)</p> Signup and view all the answers

What is the primary intention of hackers?

<p>To identify and understand system vulnerabilities (B)</p> Signup and view all the answers

How do crackers primarily differ from hackers?

<p>They work with bad intentions to compromise systems (A)</p> Signup and view all the answers

Which of the following statements is true about hackers?

<p>They mostly seek to improve system security. (C)</p> Signup and view all the answers

What is the motivation behind a cracker's actions?

<p>To undermine and harm systems (C)</p> Signup and view all the answers

Which behavior is characteristic of crackers?

<p>Breaking into systems for malicious purposes (B)</p> Signup and view all the answers

What is the primary objective of a passive attack?

<p>To collect information about the target (A)</p> Signup and view all the answers

Which of the following statements describes a passive attacker?

<p>They observe and record messages without intervention (C)</p> Signup and view all the answers

What distinguishes a passive attack from other types of attacks?

<p>It involves covertly gathering information without altering data (B)</p> Signup and view all the answers

Which scenario best exemplifies a passive attack?

<p>An individual monitors public Wi-Fi traffic to gather unencrypted data (A)</p> Signup and view all the answers

In which scenario would passive attackers be most active?

<p>In open networks where data is not encrypted (B)</p> Signup and view all the answers

What is a vulnerability in the context of cybersecurity?

<p>A potential weakness in an asset or its defensive control system. (B)</p> Signup and view all the answers

What is malware primarily designed to do?

<p>Disrupt, damage, or gain unauthorized access to a computer system. (D)</p> Signup and view all the answers

Which of the following best describes the term 'malware'?

<p>Malicious software designed to disrupt systems. (B)</p> Signup and view all the answers

Which of the following is an example of malware?

<p>A computer virus that replicates itself. (B)</p> Signup and view all the answers

What is a key characteristic of vulnerabilities in cybersecurity?

<p>They represent potential weaknesses that can be exploited. (D)</p> Signup and view all the answers

What is the primary function of keyloggers?

<p>To monitor user keystrokes (A)</p> Signup and view all the answers

What action is expected after receiving a payment according to the described process?

<p>Sending a unique key to release something (D)</p> Signup and view all the answers

Which of the following best describes the context in which keyloggers operate?

<p>As a type of malware (B)</p> Signup and view all the answers

Which situation would most likely involve the use of a keylogger?

<p>Gaining unauthorized access to personal information (D)</p> Signup and view all the answers

Which of the following is not a typical characteristic of malware like keyloggers?

<p>Providing enhanced security features (A)</p> Signup and view all the answers

What is a primary reason for the existence of bugs in software?

<p>Large quantities of code are often written and debugged. (C)</p> Signup and view all the answers

How can new software bugs be created according to the relationship between software and hardware?

<p>Through combinations of certain software and hardware. (D)</p> Signup and view all the answers

Which statement best reflects the challenge of software development?

<p>Bugs may exist after publishing due to incomplete debugging. (D)</p> Signup and view all the answers

What is a potential source of software bugs that developers must consider?

<p>Interactions between different software and hardware combinations. (A)</p> Signup and view all the answers

Why might a software release still contain bugs after the development process?

<p>The sheer volume of code makes it impossible to catch every error. (D)</p> Signup and view all the answers

Flashcards

Attack

An intentional or unintentional action that harms or compromises information and the systems it runs on.

Information compromise

Damaging or losing protected information.

IT department involvement

Coordination with the IT department is needed for certain actions.

Intentional attack

A deliberate act to harm or damage information or systems.

Signup and view all the flashcards

Unintentional attack

An accidental action that harms or damages information or systems.

Signup and view all the flashcards

Hacker motivations

Hackers often seek to understand system vulnerabilities.

Signup and view all the flashcards

Cracker motivations

Crackers exploit vulnerabilities for malicious purposes.

Signup and view all the flashcards

Hacker vs. Cracker

Hackers focus on understanding and improving systems; crackers exploit systems.

Signup and view all the flashcards

System vulnerability

Weaknesses in a system that can be exploited

Signup and view all the flashcards

Motivation of crackers

Crackers have malicious goals.

Signup and view all the flashcards

Passive attack

An attack where an attacker observes and copies messages without altering the data.

Signup and view all the flashcards

Observation in attack

A key part of passive attacks where the attacker watches data transmissions.

Signup and view all the flashcards

Data copying

Messages are copied to gain information in a passive attack.

Signup and view all the flashcards

Information gathering

The goal in passive attacks is to understand the target’s communication activity.

Signup and view all the flashcards

Data alteration

Passive attacks do not involve changing the data; only observation and copying are involved.

Signup and view all the flashcards

Vulnerability

A possible weakness in a system or its security controls.

Signup and view all the flashcards

Malware

Harmful software designed to hurt or steal from computer systems.

Signup and view all the flashcards

Malicious software

Software intentionally designed to harm or gain access to a computer.

Signup and view all the flashcards

Computer system

A set of interconnected parts working together to process information.

Signup and view all the flashcards

Unauthorized access

Gaining entry to a system or data without permission.

Signup and view all the flashcards

Keylogger

A software program that records every keystroke made by a user.

Signup and view all the flashcards

Unique key

A special code or password used to access or unlock something.

Signup and view all the flashcards

Release

To make something available or accessible.

Signup and view all the flashcards

Monitor keystrokes

To record and track every key that is pressed.

Signup and view all the flashcards

Software Bugs

Errors in computer code that cause unexpected program behavior.

Signup and view all the flashcards

Debugging

The process of finding and fixing software bugs.

Signup and view all the flashcards

Hardware-Software Interaction

The way software and hardware components work together, which can sometimes create new bugs.

Signup and view all the flashcards

Software Release Cycle

The process of developing, testing, and releasing software, which often involves publishing and selling before all bugs are found.

Signup and view all the flashcards

Code Complexity

The amount of intricate details and relationships within computer code, which can make it harder to find bugs.

Signup and view all the flashcards

Study Notes

Principles of Security - 1911194, Topic 2: The Need of Security

  • Learning Objectives: Discuss organizational need for info sec, explain shared responsibility of departments, list/describe threats to info security, and discuss Linux operating systems, distributions, and their use in security.

Business Need for Security

  • Information security performs four vital functions for organizations:
    • Protecting the organization's ability to function
    • Protecting data and info the organization collects and uses
    • Enabling safe operation of applications running on IT systems
    • Safeguarding technology assets from threats and attacks

Protecting Functionality of an Organization

  • Organizations need security management, alongside IT departments, to implement and follow security plans.
  • Management is responsible for facilitating security programs.
  • Implementing information security requires strong management, not just technology, and sound management strategies.
  • Security failures disrupt business operations and incur high costs.

Protecting Collected and Used Data

  • Organizations rely on data to deliver value to customers.
  • Safeguarding data during transmission, processing, and storage is crucial for information security.

Enabling Safe Application Operation

  • Organizations require environments protecting applications using IT systems.
  • General management oversees operations by different departments, ensuring compliance with security plans coordinated with IT departments. .

Safeguarding Technological Assets

  • Organizations must use secure hardware and software appropriate for their size and scope.
  • Additional security measures may be needed as the organization grows.
  • General management must continuously supervise and maintain proper infrastructure development; IT coordination is essential.

Threats and Attacks

  • Key Term (Attack): An intentional or unintentional act compromising information and supporting systems. Attacks can be active or passive, and direct or indirect.

  • Active Attacks: Attacker modifies message content or affects system operations (e.g., changing data streams, creating false statements.) Examples include viruses, worms, and Trojan Horses.

  • Management Reporting: Management needs insights into the types of threats (people, applications, data, info systems, physical assets).

  • Increasing Threats: Despite increasing security, threats and attacks also increase, particularly due to global internet user growth.

12 Main Threats on Information Security

  • Compromises on intellectual property (IP).
  • Deviation in quality of service.
  • Espionage or trespass (includes hackers, expert hackers, unskilled hackers, crackers.)
  • Forces of nature.
  • Human error or failure (includes disclosing data, erroneous data entry, accidental data deletion, unprotected storage).
  • Information extortion.
  • Sabotage or vandalism.
  • Software attack (Rootkits, Denial of Service -DoS- , distributed Denial of Service -DDoS).
  • Technical hardware failure or error.
  • Technological obsolescence.
  • Theft and physical attacks.

Defense in Depth (DiD)

  • Defense in Depth is an information security approach with layered security mechanisms, protecting confidentiality, integrity, and availability of networks and data within the system.

Linux Operating System

  • Linux is a modular Unix-like operating system, based on principles from the 1970s and 1980s.

  • It's open-source so users can create their own distributions.

  • Examples of well known Linux Distributions include: Ubuntu, Fedora, Linux Mint, Debian, Kali Linux, and CSI Linux.

  • Different Distributions are focused on different functional uses from ethical hacking to digital forensics.

  • Web sites such as www.Linux.org and www.Kali.org offer relevant information and support.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz covers the critical need for information security within organizations. It discusses organizational responsibilities, potential threats to information security, and the role of Linux operating systems in maintaining security. Test your knowledge on how businesses can protect their information and functionality.

More Like This

IT002 - Information Assurance Module 1
40 questions
Ethical Hacking Using Kali Linux
5 questions
Use Quizgecko on...
Browser
Browser