1.1 Cybersecurity Landscape Flashcards
Web 3.0 main features
- Semantic Web
- Artificial Intelligence
- 3D Graphics
- Connectivity
- Ubiquity
Enterprise 2.0
The use of emergent social software platforms within companies, or between companies and their partners or customers.
Unintended consequences of Mobile computing (unsure benefits and the inherent risks).
- Implicitly allow personal technology and apps
- Explicitly prohibit their use, but unable to effectively enforce such policies.
Adverse results of ineffective mobile computing policies
- Lost productivity
- Potential disruption of critical business operations
- Exposure to additional risks
- Penalties for regulatory non-compliance
Techniques used to circumvent port-based firewall
- Port hopping
- Use of non-standard ports
- Tunneling within commonly used services
- Hiding within SSL encryption
Attack vector
A path or tool that an attacker uses to target a network
Cloud security trade-offs
Simplicity or Function
Efficiency or Visibility
Agility or Security
Cloud computing contrary to network security
- Cloud computing doesn’t mitigage existing network security risks.
- Separation and segmentation are fundamental to security; the cloud relies on shared resources.
- Security deployments are process-oriented; cloud computing environments are dynamic.
SaaS Aplication Risks
- Malicious outsiders
- Malicious insiders
- Accidental data exposure
- Accidental share
- Promiscuous share
- Ghost (or stale) share
Security Compliance
- Canada Personal Infromation Protection and Electronic Documents Act (PIPEDA)
- Eurpoean Union General Data Protection Regulation (GDPR)
- EU Netwrok and Information Security (NIS) Directive
- North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP)
- Payment Card Industry Data Security Standards (PCI DSS)
- US Cybersecurity Enhancement Act of 2014
- US Cybersecurity Information sharing Act (CISA)
- US Federal Exhancge Data Breach Notification Act of 2015
- US Federal Information Security Modernization Act (FISMA)
- US Gramm-Leach-Bliley Act (GLBA)
- US Health Insurcance Portability and Accountability Act (HIPPA)
- US National Cybesecurity Protecion Advancement Act of 2015.
- US Sarbanes-Oxley (SOX) Act
Lessons from recent cyberattack
- A “low and slow” cyberattack can go undetected for weeks, month, or even years.
- An attacker will target an auxiliary system or other vulnerable endpoint, then pivot the attack toward the primary target.
- Unpatched vulnerabilities are a commonly exploited attack vector.
- The direct and indirect financial cost of a breach can be devastating.