click below
click below
Normal Size Small Size show me how
IAAS 245 Test 1
Study for Disaster Recovery Test 1
Question | Answer |
---|---|
3 Goals of Computer Security | Confidentiality, Integrity, Availability |
Confidentiality | Controls are USER IDs and PASSWORDS. - Means PRIVACY. |
Integrity | Only authorized users - Prevents unauthorized users from modification - Maintain internal & external consistency of data and programs |
Availability | Denial of Server (DoS) - Loss of information system capabilities because of natural disasters - Equipment failures during normal use |
Threat | A category of objects, persons or other entities that pose a potential risk of loss to an asset |
Asset | An organizational resource that is being protected |
List 3 Assets | Computer, Data, People |
Vulnerability | A weakness or fault in the protection mechanisms that are intended to protect information and information assets from attack or damage |
Exploit - Verb | Act of breaking into a system. - EXAMPLE: The hackers exploited the zero day vulnerability in Windows 7. |
Exploit - Noun | Weakness/Poor Code - EXAMPLE: There is a zero day exploit in Windows 7. |
Control | Represents security mechanisms, policies or procedures that can successfully counter attack, reduce risk, resolve vulnerabilities |
Lists Examples of Control | Firewall, IDS, Usernames/Passwords, Encyption, Physical Security |
Intellectual Property | Defines the ownership of ideas and control over the tangible or virtual representation of those ideas. - Examples: copyright, trademarks, patents |
Software Piracy | Most common IP breach is the unlawful use or duplication of software-based intellectual property |
Hackers | People who use and create computer software to gain access to information illegally. |
Cyberterrorists | Hacks systems to conduct terrorist’s activities through network or Internet pathways. |
Denial of Service (DoS) | Seeks to deny legitimate users access to services by either tying up server’s available resources or causing it to shut down |
Virus | Segments of code that perform malicious actions. |
Worm | Malicious programs that replication themselves constantly without requiring another program to provide a safe environment for replication. |
Polymorphism | A threat that changes its appearance shape overtime, making it undetectable by techniques that look for preconfigured signatures. |
Social Engineering Attack | Getting the computer user to perform an action that enables the infection. - Most Used Method = *PHONE* |
Virus Attacks | The source of the most financial loss |
Risk Identification | The process of examining and documenting the security posture of an organization’s IT and the risks it faces - **INFORMATION TECHNOLOGY |
Risk Control | The process of applying controls to reduce the risks to an organizations data and information systems - **DATA & INFORMATION SYSTEMS |
Risk Management | Identifying vulnerabilities in an organization’s information systems and taking carefully reasoned steps to ensure the confidentiality, integrity and availability of all the components in the organization’s information system - **VULNERABILITIES |
Risk Assessment | Assigns a risk rating or score to each information asset - **RATING or SCORE |
Likelihood | The probability that a specific vulnerability within an organization will be successfully attacked |
Residual Risk | The risk that remains to the information asset even after the existing control has been applied |
List the 4 Control Strategies | Avoidance, Transference, Mitigation, Acceptance |
Avoidance | Prevent exploitation of the vulnerability - Preferred approach - Safeguards |
Transference | Shift the risk to other assets - Buy insurance - Outsource |
Mitigation | Reduce the impact - Incident response plan - Disaster recovery plan |
Acceptance | DO NOTHING |