PCIT07

Cards (41)

  • 3 COUNTERMEASURES
    1. TECHNOLOGY
    2. POLICY
    3. PEOPLE
  • 3 STATES OF INFORMATION
    1. STORAGE
    2. TRANSMISSION
    3. PROCESSING
  • 5 BASIC IA SERVICES
    1. AVAILABILITY
    2. INTEGRITY
    3. AUTHENTICATION
    4. CONFIDENTIALITY
    5. NONREPUDIATION
  • ACM EXTENSION
    1. CONFIDENTIALITY
    2. INTEGRITY
    3. AVAILABILITY
  • 4 FUNDAMENTAL CONCEPTS
    1. INFORMATION ASSURANCE
    2. INFORMATION POLICY
    3. INFORMATION SECURITY
    4. CYBERSECURITY
  • ATTACK SOURCES
    1. ENVIRONMENTAL
    2. TECHNOLOGICAL
    3. HUMAN FACTOR
  • SECURITY THREATS
    1. MALWARE ATTACKS
    2. PHISING ATTACKS
    3. DRIVE BY ATTACKS
    4. PASSWORD ATTACK
    5. CRYPTO JACKING ATTACK
    6. MAN IN THE MIDDLE ATTACK
  • TYPES OF MALWARE
    1. VIRUS
    2. TROJAN HORSE
    3. WORMS
    4. RANSOMWARE
    5. SPYWARE
    6. ROOTKIT
  • PASSWORD ATTACK
    1. BRUTE FORCE ATTACK
    2. DICTIONARY ATTACK
  • 7 IA PRINCIPLES
    1. Be a business enabler
    2. Protect the interconnecting element of an organization’s systems
    3. Be cost effective and cost beneficial
    4. Establish responsibilities and accountability
    5. Require a robust method
    6. Be assessed periodically
    7. Be restricted by social obligations
  • INFORMATION ASSURANCE-
    -overaching approach for identifying, managing risks.
    -concerned with life cycle of information
    -includes all information may process, store, transmit or disseminate.
  • INFORMATION SECURITY - subdomain of information assurance, focuses on CIA TRIAD.
    • INFORMATION PROTECTION AND CYBERSECURITY are subset.
  • INFORMATION PROTECTION- best viewed as subset of information security. Protecting the confidentiality and integrity of information.
  • CYBERSECURITY - replaced the term "computer security" often confused with information protection and security. Focuses on vulnerabilities or threats.
  • ENVIRONMENTAL- Non malicious attacks caused by natural phenomena.
  • TECHNOLOGICAL - hardware malfunctions, used of outdated of software and hardware .
  • HUMAN FACTOR- caused by human agents, can be malicious or non-malicious.
    Caused by ignorant employees, categorized by cyber attacks.
  • Malware attack- carried through malicious applications.
  • PHISING ATTACK - practice sending of fake emails to trick users.
  • DRIVE-BY ATTACK - uses insecure websites to plant a code, activate simply by visiting a website.
  • PASSWORD ATTACK - most common method of security breaches.
  • CRYPTO JACKING ATTACK - targetted to mine cryptocurrency.
  • MAN IN THE MIDDLE- illegitimate users poses as a user in session.
  • Network Security Model exhibits how the security service has been designed over the network to prevent the opponent from causing a threat to the confidentiality or authenticity of the information that is being transmitted through the network.
  • ‘network security model’ how messages are shared between the sender and receiver securely over the network. ‘network access security model’ which is designed to secure your system from unwanted access through the network.
  • Now, the transmission of a message from sender to receiver needs a medium i.e. Information channel which is an Internet service.
  • A logical route is defined through the network (Internet), from sender to the receiver and using the communication protocols both the sender and the receiver established communication.
  • Transformation of the information which has to be sent to the receiver. So, that any opponent present at the information channel is unable to read the message. This indicates the encryption of the message.
  • the encryption key which is used during the encryption of the message at the sender’s end and also during the decryption of message at receiver’s end
  • There must be a trusted third party which should take the responsibility of distributing the secret information (key) to both the communicating parties and also prevent it from any opponent.
  • The network security model presents the two communicating parties sender and receiver
  • Secret information is used while transforming the message which will also be required when the message will be retransformed at the recipient side
  • To transform a readable message at the sender side into an unreadable format, an appropriate algorithm should be designed such that it should be difficult for an opponent to crack that security algorithm.
  • Next, the network security model designer is concerned about the generation of the secret information which is known
    as a key.
  • Hacker: The one who is only interested in penetrating into your system. They do not cause any harm to your system they only get satisfied by getting access to your system.
  • Intruders: These attackers intend to do damage to your system or try to obtain the information from the system which can be used to attain financial
  • Information threat: This kind of threats modifies data on the user’s behalf to which actually user should not access. Like enabling some crucial permission in the system.
  • Service threat: This kind of threat disables the user from accessing data on the system.
  • There are two ways to secure your system from attacker of which the first is to introduce the gatekeeper function. Introducing
    gatekeeper function means
    introducing login-id and passwords which would keep away the unwanted access.
  • second way to secure your system is introducing internal control which would detect the unwanted user trying to access the system by analyzing system activities.