CS 405 REVIEWER FINAL EXAM
CS 405 REVIEWER FINAL EXAM
COMPUTER SECURITY
- Computer security also known as cybersecurity, focuses on protecting computer
systems, networks, and data from unauthorized access, attacks, damage, or theft.
It ensures that sensitive data remains protected, operations are not disrupted, and
resources are used appropriately
IMPORTANCE OF COMPUTER SECURITY
-Computer security is critical for safeguarding information, maintaining operational
functionality, and ensuring user trust. It reduces the risk of unauthorized access,
data breaches, financial losses, and reputational harm
3 PRINCIPLES OF COMPUTER SECURITY
1. Confidentiality
Confidentiality ensures that sensitive information is only accessible to
an authorized individuals or systems.
REAL-WORLD EXAMPLES:
• Secure messaging apps like WhatsApp or Messenger used end-to-
end encryption
2. Integrity
Integrity ensures that data is accurate and consistent, and cannot be
altered or tampered with undetected.
REAL-WORLD EXAMPLES:
• Software update files are signed digitally to verify their authenticity
and integrity
3. Availability
Availability ensures that systems, data, and resources are accessible to
authorized users whenever needed.
REAL-WORLD EXAMPLES:
• Banks use high-availability systems to ensure 24/7 access to online
banking services
WHAT IS “BUYING SECURITY”?
In the context of computer security, "buying security" typically refers to the
acquisition of security products, services, or solutions designed to protect
computer systems, networks, and data from cyber threats
BUYING SECURITY OFFERS:
1. Software Solutions
2. Hardware Solutions
3. Cloud Security Services
4. Managed Security Services
5. Consulting And Training
6. Compliance Solutions
IMPORTANCE OF BUYING SECURITY
1. PROTECTION OF SENSITIVE DATA
o Investing in security measures helps safeguard sensitive information
such as personal data, financial records, and intellectual property from
unauthorized breached.
2. MITIGATION OF CYBER THREATS
o With the rise of cybercrime, including ransomware and phishing
attacks, purchasing security solution is crucial to defend against these
evolving threats that can compromise systems and data
3. REGULATORY COMPLIANCE
o Many organizations are required to comply with data protection
regulations. Investing in security ensures adherence to these laws,
avoiding potential fines and legal issues
4. MAINTAINING BUSINESS CONTINUITY
o effective security measures help prevent disruptions caused by cyber
incidents, ensuring that business operations can continue smoothly
without significant downtime
5. BUILDING CUSTOMER TRUST
o Demonstrating a commitment to security can enhance customer
confidence, as clients are more likely to engage with businesses that
prioritize the protection of their data
6. COST-EFFECTIVENESS
o While there is an upfront cost associated with purchasing security
solutions, the potential financial losses from data breaches, including
recovery costs and reputational damage, can far exceed initial
investment.
7. HOLISTIC RISK MANAGEMENT
o Security investment contribute to a comprehensive risk management
strategy, addressing not only technological vulnerabilities but also
human and process related risks.
8. ADAPTION TO TECHNOLOGICAL CHANGES HOLISTIC RISK
MANAGEMENT
o Security investment contribute to a comprehensive risk management
strategy, addressing not only technological vulnerabilities but also
human and process related risks. As technology evolves, so do the
methods used by cybercriminals. Investing in security ensures that
organizations can adapt to new threats and protect their assets
effectively.
ELEMENTS OF COMPUTER SECURITY
1. PREVENTION
o Measures to stop security breaches before they occur, such as
firewalls, antivirus software, and training.
2. DETECTION
o Identifying potential security threats through intrusion detection
systems (IDS) and monitoring tools
3. RESPONSE
o Responding to and mitigating the effects of security incidents with
incident response plans
4. RECOVERY
o Restoring normal operations after a security breach, often involving
backups and disaster recovery solutions
EXTENT OF RESPONSIBILITIES
1. ORANIZATIONS
o Responsible for implementing security policies, training employees,
and safeguarding customer data
2. EMPLOYEE
o Must follow security protocols, report suspicious activities, and avoid
risky behaviors like using weak passwords.
3. VENDORS
o Should ensure their products and services comply with security
standards
4. GOVERNMENT
o Enforces regulations and provides framework like GDPR or HIPAA to
ensure compliance
THREAT CATEGORIES & REPORTED CRIMES
1. DISGRUNTLED EMPLOYEE OR CONTRACT EMPLOYEE (INSIDER
THREAT CRIME) EXAMPLE:
o Deleting or corrupting sensitive data
o Leaking confidential information
o Sabotaging critical systems
PREVENTIVE MEASURES: •
o Restricting Access
o Activity Monitoring
o Security Awareness Training
2. ORGANIZED CRIME OR DRUG CARTEL
EXAMPLE:
o Ransomware attacks
o Stealing financial information
o Money Laundering
PREVENTIVE MEASURES:
o Strong encryption
o Secure payment gateways
o Law enforcement collaboration
3. CYBERCRIMINAL
EXAMPLE:
o Phishing scams
o Identity Theft
o Distributed Denial of Service (DDoS) attacks
PREVENTIVE MEASURES:
o Anti-Malware solutions
o User education
o Network monitoring
4. COMPETITORS
EXAMPLE:
o Stealing trade secrets
o Spreading disinformation
o Hacking proprietary systems
PREVENTIVE MEASURES:
o Protect intellectual property
o Conduct risk assessments
o Legal measures
5. HACKERS
EXAMPLE:
o Website defacement
o Exploiting software vulnerabilities
o Data breaches
PREVENTIVE MEASURES:
o Software updates
o Penetration testing
o Firewalls and IDS
6. GOVERNMENT
EXAMPLE: •
o Cyber espionage
o Attacking critical infrastructure
o Spreading misinformation
PREVENTIVE MEASURES:
o National Cybersecurity frameworks
o International collaboration
o Advanced Monitoring
IMPLICATION OF THREATS TO ORGANIZATIONS
FINANCIAL LOSSES
1. Data Breaches
o Unauthorized access to sensitive personal data, such as health records
or financial information
2. Identity Theft
o Stolen personal data can be used for identity theft, leading to financial
losses and reputational damage.
3. Surveillance
o Unauthorized surveillance can compromise individual privacy.
IMAGE LOSS
1. Reputational Damage
o Security breaches can damage an organization’s reputation and erode
customer trust.
2. Loss of Customer Confidence
o Customer may lose confidence in any organization’s ability to protect
their data.
3. Negative Media Coverage
o Security breaches can attract negative media coverage, further
damaging an organization’s reputation.
LEGAL IMPLICATIONS
1. Regulatory Compliance
o Organization must comply with relevant regulations, such as GDPR,
HIPAA, or PCI-DSS.
2. Litigation
o Security breaches can lead to litigation, resulting in financial losses and
reputational damage.
3. Fines and Penalties
o Organizations may face fines and penalties for noncompliance with
regulatory requirements.
WHAT IS TECHNIQUE OF INTRUDERS?
Corrective controls enter the picture after an incident has happened. They
exist to minimize damage, facilitate recovery, and repair weaknesses so a
similar attack doesn’t happen again. For example, robust backup mechanisms
are a corrective control because they let you restore compromised data. By
employing effective backups, you can mitigate data loss and expedite the
restoration of your systems, reducing downtime and restoring normal
operations promptly.
AUDIT TRAILS
refers to a chronological record or set of logs that provide detailed
information about all activities, events, and transactions performed within a
system. These trails are essential for monitoring, detecting, and analyzing
potential security incidents, ensuring accountability, and maintaining compliance
with security policies and regulations.
Examples:
o System Access Logs
o Transaction Logs
o File Access Logs
o Network Activity Logs
o Application Logs
CORRECTIVE CONTROLS
Refers to a measure taken after a security incident has been detected,
aiming to minimize damage, restore normal operations, and prevent similar
incidents from happening again by addressing the root cause and implementing
necessary fixes; essentially, it's a reactive control that takes action after a breach
occurs to repair vulnerabilities and recover from the incident.
Example: robust backup mechanisms are a corrective control because they let
you restore compromised data. By employing effective backups, you can mitigate
data loss and expedite the restoration of your systems, reducing downtime and
restoring normal operations promptly.
RECOVERY CONTROLS
What is Recovery control?
a security measure implemented to restore a system or process back to
normal operations after a security incident occurs, essentially allowing an
organization to recover from a breach or disruption and resume regular functions;
this includes actions like data backups, system restoration, and contingency plans
to minimize downtime and impact.
Examples:
• Data backups and restoration procedures
• Disaster recovery plans
• System redundancy and failover mechanisms •Incident response plan
CS 406 REVIEWER
LIST OF CYBERCRIMES
• Child Pornography OR Child sexually abusive material (CSAM)
• Cyber Bullying
• Cyber Stalking
• Cyber Grooming
• Online Job Fraud
• Online Sextortion
• Phishing
• Vishing
• Smishing
• Sexting
• SIM Swap Scam
• Credit Card Fraud or Debit Card Fraud
• Impersonation and identity theft
• Spamming
• Ransomware
• Viruses, Worms, and Trojans
• Data Breach
• Denial of Services (DoS) attack
• Website Defacement
• Cyber-Squatting
• Pharming
• Cryptojacking
• Online Drug Trafficking
• Espionage
IMPLEMENT RULES AND REGULATIONS
o The Implementing Rules and Regulations (IRR) of a law are detailed
guidelines or procedures that are created to help put the law into action.
Once a law is passed, the IRR is developed by a government agency or body
designated by the law to ensure that its provisions are carried out effectively.
o The main purpose of the IRR is to provide clarity and specifics on how the law
should be implemented. It serves as a tool to guide government agencies,
businesses, and citizens on the proper interpretation and application of the
law.