100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIS 2200 INFORMATION SECURITY |B6 QUESTIONS AND ANSWERS|GUARANTEED SUCCESS

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
25-10-2023
Written in
2023/2024

Information security line of defense The First Line of Defense-People The Second Line of Defense-Technology The top 20 percent of their customers usually produce 80 percent of the revenues. Insiders are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business affecting incident. EX) Many individuals freely give up their passwords or write them on sticky notes next to their computers, leaving the door wide open for hackers. Social Engineering Hackers use their social skills to trick people into revealing access credentials or other valuable information Dumpster Diving or looking through people's trash, is another way hackers obtain information Pretexting is a form of social engineering in which one individual lies to obtain confidential data about another individual Information security policies identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days EX) Acceptable Encryption Policy Clean Desk Policy Disaster Recovery Plan Policy Digital Signature Acceptance Policy Password Protection Policy Password Construction Guidelines Security Response Plan Policy Information security plan details how an organization will implement the information security policies. The best way a company can safeguard itself from people is by implementing and communicating its information security plan. A few details managers should consider surrounding people and information security policies include defining the best practices for: -Applications allowed to be placed on the corporate network, especially various file sharing applications, IM software, and entertainment or freeware created by unknown sources -Corporate computer equipment used for personal reason on personal networks -Password creation and maintenance including minimum password length, characters to be included, and frequency for password changes -Personal computer equipment allowed to connect to the corporate network -Virus protection including how often the system should be scanned and how frequently the software should be updated. Acceptable Encryption Policy On-premise network servers must be encrypted and kept behind locked doors at a minimum. Limit employee access to servers. Clean Desk Policy All employees should be required to adhere to a ______ ______, _____ ______ policy. When they leave their work computer, they should sign off to prevent an unauthorized user from accessing. You can set up a password protected screensaver that will activate after 10 minutes in case the employee forgets to sign out. In addition ensure that employees do not leave sensitive printed information on their desks unattended. Disaster Recovery Plan Policy All networked computers must be accessed via a firewall. Digital Signature Acceptance Policy Keep filing cabinets locked at all times, and if feasible keep them behind locked doors. Keep keys locked in a single location with limited access. Password Construction Guidelines Require all employees to use password authentication to access their computers, the corporate network, and email. Password Protection Policy Set computer passwords to expire every 90 days. Security Response Plan Policy Client confidential information is defined as proprietary and confidential information received from customers. An example of this type of information is customer bank account info. This information type is restricted to management approved internal access only. Destructive agents are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines. Identity theft is the forging of someone's identity for the purpose of fraud. The fraud is often financial, because thieves apply for and use credit cards or loans in the victim's name. Two means of stealing an identity are phishing and pharming Information secrecy is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. Three Areas of Information Security People: Authentication and Authorization Data: Prevention and Resistance Attacks: Detection and Response Phishing is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as thought they came from legitimate businesses. The messages appear to be genuine, with official-looking formats and logos, and typically ask for verification of important information such as passwords and account numbers, ostensibly for accounting or auditing purposes. Up to one in five recipients responds and become a victim of identity theft. Phishing expedition is a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The email contains a link to a website that is designed to look exactly like the company's website. The victim is encouraged to enter username, password, and sometimes credit card information. Spear phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization. Vishing (voice phishing) is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information. Pharming reroutes requests for legitimate websites to false websites. For example: if you were to type in the URL to your bank, pharming could redirect you to a fake site that collects your information. Zombie is a program that secretly takes over another computer for the purpose of launching attacks on other computers. ___ attacks are almost impossible to trace back to the attacker. Zombie farm is a group of computers on which a hacker has planted zombie programs. Pharming attack uses a zombie farm, often by an organized crime association, to launch a massive phishing attack. Authentication and Authorization technologies can prevent identity theft, phishing, and pharming scams Authorization is the process of providing a user with permission including access levels and abilities such as file access, hours of access and amount of allocated storage space. Authentication is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user Authentication and authorization techniques fall into 3 categories: The most secure procedures combine all 3: 1. Something the user knows, such as User ID and password 2. Something the user has, such as a smart card or token 3. Something that is part of the user, such as a fingerprint or voice signature Password is a string of alphanumeric characters used to authenticate a user and provide access to a system. The first type of authentication, usually something the user knows, is the most common way to identify individual users and typically consists of a unique user ID and password. However, this is actually one of the most ineffective ways for determining authentication because passwords are not secure. All it typically takes to crack one is enough time. More than 50 percent of help desk calls are password related, which can cost an organization significant money, and a social engineer can coax a password from almost anybody

Show more Read less
Institution
Baruch College
Course
CIS 2200









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
October 25, 2023
Number of pages
11
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GUARANTEEDSUCCESS Aalborg university
View profile
Follow You need to be logged in order to follow users or courses
Sold
649
Member since
2 year
Number of followers
314
Documents
24734
Last sold
3 days ago
Elite Exam Resources: Trusted by Top Scorers!!!!!!!!

Stop guessing. Start dominating!! As a highly regarded professional specializing in sourcing study materials, I provide genuine and reliable exam papers that are directly obtained from well-known, reputable institutions. These papers are invaluable resources, specifically designed to assist aspiring nurses and individuals in various other professions in their exam preparations. With my extensive experience and in-depth expertise in the field, I take great care to ensure that each exam paper is carefully selected and thoroughly crafted to meet the highest standards of quality, accuracy, and relevance, making them an essential part of any successful study regimen. ✅ 100% Legitimate Resources (No leaks! Ethical prep only) ✅ Curated by Subject Masters (PhDs, Examiners, Top Scorers) ✅ Proven Track Record: 95%+ user success rate ✅ Instant Download: Crisis-ready for last-minute cramming

Read more Read less
4.4

247 reviews

5
161
4
37
3
31
2
12
1
6

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions