An Introduction - Topic 1 Flashcards

1
Q

What is cybersecurity?

A

Cyberspace + security

From different perspectives different things.

Summary: “Protecting critical systems and sensitive information from digital attacks”

From our perspective: “Cybersecurity is the process and techniques involved in protecting sensitive data, computer systems, networks and software applications from cyber (network-based, digital) attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cyberspace?

A

Physical infrastructure, critical infrastructure, and cyber infrastructure (e.g. the internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is physical infrastructure?

A

Farms, food processing plants, delivery sites , fibre cables, gov facilities, hospitals, nuclear power plants, highways, railways, ports…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Critical Infrastructure / Key resources (CIKR)

A

Government, health, emergency, gas and oil, electricity and energy, water, transportation, communication, banking, …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is cyber infrastructure?

A

Hardware, software, interconnected networks (i.e. the internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the cybersecurity domains?

A

Critical infrastructure security - protecting devices, computer systems, networks and other assets that society relies upon

Network/internet security - protecting a computer network from intruders

Application security - protecting applications operating on-premises and in the cloud, handling data, user authentication, authorisation, etc.. securely

Cloud security - protecting data at rest, in transit and in use to support customer privacy, business requirements and regulatory compliance standards.

Information security - securing sensitive data from unauthorised access, exposure or theft

End-user education - building security awareness across the organisation to strengthen endpoint security

Disaster recovery / business continuity planning - tools and procedures for responding to unplanned events, such as natural disasters, power outages or cybersecurity incidents, with minimal disruption to key operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the name of the program that bought down a large fraction of the internet in 1988?

A

Morris Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the relationship between attack sophistication vs Skill level needed by attackers?

A

As attack sophistication goes up, skill level needed by attackers is going down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is there definitely a one-for-all solution for all heterogeneous devices?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What problems are caused by the anonymous nature of many internet based services?

A

Hard to trace the origin of an attack or the attackers.

legitimate services and software may be exploited by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is there a need for international collaboration to address attacks?

A

Global networks exist without national boundaries, so attacks are mounted anywhere on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Policy / Requirement specification bugs?

A

Inappropriate security policy of goals:
- Threat analysis
- Access control, least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are design bugs in cybersecurity?

A
  • Inappropriate use of cryptographic methods/tools
  • Poor source of randomness
  • Insecurity Protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are implementation bugs in cybersecurity?

A

Buffer Overflows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some problems with management procedures?

A

Is the implemented system usable? Does it achieve the security goal? Have the risks been mitigated?

End-users, employees, administrators. Do they perform their tasks/roles as expected?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly