chap1 Flashcards
Great businesses have been created by __________ and __________ the power of data and data analytics
Collecting and Harnessing
This group of criminals breaks into computers or networks to gain access for various reasons.
Hackers
Break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
White hat hackers
Somewhere between white and black hat attackers. These attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Gray hat hackers
Are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
Black hat hackers
Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
Script Kiddies
Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
Vulnerability Brokers
Grey hat hackers who rally and protest against different political and social ideas. They publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.
Hacktivists
These are black hat hackers who are either self-employed or working for large cybercrime organizations. Each year, they are responsible for stealing billions of dollars from consumers and businesses.
Cyber Criminals
Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks. Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
State Sponsored Hackers
The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities.
Vulnerability Database
The Honeynet project is an example this system. The project provides a HoneyMap which displays real-time visualization of attacks.
Early Warning Systems
InfraGard is an example of widespread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.
Share Cyber Intelligence
The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.
ISM Standards
The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.
New Laws
Is the possibility that a harmful event, such as an attack, will occur.
Cybersecurity threat
Is a weakness that makes a target susceptible to an attack.
Cyber vulnerability
Criminals use __________ tools to capture data streams over a network. Works by monitoring and recording all information coming across a network.
Packet-sniffing
Criminals can also use __________, such as unsecured Wi-Fi access points.
Rogue devices
Interferes with an established network communication by constructing packets to appear as if they are part of a communication.
Packet forgery (or packet injection)
On a __________ level, everyone needs to safeguard his or her identity, data, and computing devices.
Personal level
At the __________ level, it is the employees’ responsibility to protect the organization’s reputation, data, and customers.
Corporate level