Chapter 16 Flashcards
Whats cyber threats
threats that comes from individual hackers, criminal groups
Whats cybersecurity
The measure a company takes to protect a computer or a systems against unauthorized access or attacks
What are some of the recent cyber attacks
Colonial pipeline : Attack for ransomware
Florida water supply : Hacker accessed the water and increased the sodium hydroxide levels to fatals amounts
Equifax: Names ,social security and more were stolen during data breach
Whats is Nation Institute of Standard and Technology (NIST) five functions that company should address to cybersecurity risk
- recover
2.Identify - Protect
- Detect
- Respond
Whats the cyber kill chain
the life cycle of cyberattack from the early stage of gathering information through the final steps of damaging the network
The three steps in cyber kill chain are
gathering info about the network
Accessing the network
Disrupting the network, causing damage
What are the 3 types of cyber attacks
Reconnaissance attacks
Access attacks
Disruptive attacks
Explain reconnaissance attacks
knowledge gathering attacks that help attackers identify targets and plan their operations.
They can set the stage for later access and disrupt the network
When gathering information whats are the categories and explain them
Physical attack: Threaten element a network administrator has no control over. Ex: people, physical security
Logical attacks: Occur on a fully digital spectrum
Whats physical reconnaissance attack
use human interaction to generate info about the network
Phishing is
involves persuading people to perform acts that would give access to confidential information
Whats email phishing
deceptive request designed to trick the victim into sharing private information
Whats dumpster diving
is looking through someone else physical trash
Eavesdropping is
unauthorized interception of communication
To avoid the eavesdropping risk company
use encrypt data and secure communication line. They use file transfer protocol (FTP) that allows them to transfer between company network and outside parties