1.1 Cybersecurity Landscape Flashcards

1
Q

Web 3.0 main features

A
  1. Semantic Web
  2. Artificial Intelligence
  3. 3D Graphics
  4. Connectivity
  5. Ubiquity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enterprise 2.0

A

The use of emergent social software platforms within companies, or between companies and their partners or customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unintended consequences of Mobile computing (unsure benefits and the inherent risks).

A
  • Implicitly allow personal technology and apps

- Explicitly prohibit their use, but unable to effectively enforce such policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adverse results of ineffective mobile computing policies

A
  • Lost productivity
  • Potential disruption of critical business operations
  • Exposure to additional risks
  • Penalties for regulatory non-compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Techniques used to circumvent port-based firewall

A
  • Port hopping
  • Use of non-standard ports
  • Tunneling within commonly used services
  • Hiding within SSL encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attack vector

A

A path or tool that an attacker uses to target a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud security trade-offs

A

Simplicity or Function
Efficiency or Visibility
Agility or Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing contrary to network security

A
  • Cloud computing doesn’t mitigage existing network security risks.
  • Separation and segmentation are fundamental to security; the cloud relies on shared resources.
  • Security deployments are process-oriented; cloud computing environments are dynamic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SaaS Aplication Risks

A
  • Malicious outsiders
  • Malicious insiders
  • Accidental data exposure
  • Accidental share
  • Promiscuous share
  • Ghost (or stale) share
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Compliance

A
  • Canada Personal Infromation Protection and Electronic Documents Act (PIPEDA)
  • Eurpoean Union General Data Protection Regulation (GDPR)
  • EU Netwrok and Information Security (NIS) Directive
  • North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP)
  • Payment Card Industry Data Security Standards (PCI DSS)
  • US Cybersecurity Enhancement Act of 2014
  • US Cybersecurity Information sharing Act (CISA)
  • US Federal Exhancge Data Breach Notification Act of 2015
  • US Federal Information Security Modernization Act (FISMA)
  • US Gramm-Leach-Bliley Act (GLBA)
  • US Health Insurcance Portability and Accountability Act (HIPPA)
  • US National Cybesecurity Protecion Advancement Act of 2015.
  • US Sarbanes-Oxley (SOX) Act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Lessons from recent cyberattack

A
  • A “low and slow” cyberattack can go undetected for weeks, month, or even years.
  • An attacker will target an auxiliary system or other vulnerable endpoint, then pivot the attack toward the primary target.
  • Unpatched vulnerabilities are a commonly exploited attack vector.
  • The direct and indirect financial cost of a breach can be devastating.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly