Chapter 21 Flashcards

1
Q

What is the current trend regarding information security breaches?

A

Information security breaches are on the rise.

The increasing number of breaches highlights the need for improved security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the factors that can amplify a firm’s vulnerability to a security breach?

A
  • Personnel issues
  • Technology problems
  • Procedural factors
  • Operational issues

These factors can significantly increase the risk of a security compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must be a top organizational priority according to information security principles?

A

Information security must be made a top organizational priority.

This prioritization is essential for protecting organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What major data breach targeted Equifax?

A

Hackers grabbed data on 143 million consumers, including sensitive personal information.

The breach had a global impact, affecting individuals in the U.K. and Canada.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What were the consequences of the Target hack?

A
  • 40 million credit cards stolen
  • Personal info on 70 million consumers exposed
  • Largest decline in transactions
  • Falling profits
  • CEO ouster

The breach led to significant financial and reputational damage for Target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a distributed denial of service (DDoS) attack?

A

An attack where a firm’s computer systems are flooded with thousands of seemingly legitimate requests.

The volume of requests can slow down or shut down a site’s use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ransomware?

A

Malware that infiltrates networks, encrypts data, and holds it hostage for ransom.

Ransom is typically demanded in untraceable cryptocurrency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is corporate espionage?

A

Espionage performed by insiders, rivals, or foreign governments to steal sensitive information.

Various industries, including biotech and aerospace, have been targeted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Stuxnet known for?

A

Stuxnet is known as a notorious act of cyberwarfare that infiltrated Iranian nuclear facilities.

It demonstrated the potential to destroy critical infrastructure without physical conflict.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of white hat hackers?

A

White hat hackers uncover computer weaknesses without exploiting them.

They contribute to improving system security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define phishing.

A

Cons executed using technology to acquire sensitive information or trick someone into installing malicious software.

Phishing is a common method of social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are zero-day exploits?

A

New attacks that haven’t been clearly identified and incorporated into security screening systems.

They pose significant risks as defenses may not be in place yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is multifactor authentication?

A

A security method that requires more than one item for proof of identity.

This can include something you know (password) and something you have (a token).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are biometrics in the context of security?

A

Biometrics measure and analyze human body characteristics for identification or authentication.

Examples include fingerprint and facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SQL injection?

A

A technique that targets poorly designed software by injecting malicious SQL code.

It exploits vulnerabilities in applications that do not validate user input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is push-button hacking?

A

Tools designed to easily automate cyberattacks.

Generative AI has contributed to the creation of such tools, making attacks more accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the term ‘script kiddies’ refer to?

A

A pejorative term for unsophisticated hackers who use existing scripts or programs to hack rather than creating their own exploits.

They rely on tools developed by more skilled hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of deepfakes in cybersecurity?

A

Deepfakes are sophisticated media created by AI that can impersonate real people or events.

They can be used for malicious purposes, including social engineering attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the implications of AI in cybersecurity?

A

AI can increase the volume and sophistication of threats, but it can also enhance cybersecurity defenses.

Organizations need to be vigilant and adapt to new AI-driven threats.

20
Q

What is a botnet?

A

A network of surreptitiously infiltrated computers controlled remotely.

Botnets can be used for various malicious activities, including DDoS attacks.

21
Q

What are ‘bad apples’ in the context of information security?

A

Rogue employees who steal secrets, install malware, or hold a firm hostage.

They pose significant internal threats to organizational security.

22
Q

What is the potential risk of poorly designed software?

A

It can lead to security vulnerabilities that attackers can exploit through methods like SQL injection.

All systems must be designed with security in mind to prevent such risks.

23
Q

What are some tools specifically designed for cyberattacks?

A

WormGPT, DarkBERT, DarkBART, ChaosGPT

These tools assist in various malicious activities, including information gathering and malware creation.

24
Q

What is dumpster diving?

A

Combing through trash to identify valuable assets

A physical threat method used to retrieve sensitive information.

25
What does shoulder surfing involve?
Gaining compromising information through observation ## Footnote This can include watching someone enter a password or sensitive data.
26
What is eavesdropping in the context of cybersecurity?
Efforts to listen into or record conversations, transmissions, or keystrokes ## Footnote This can be done through various means, including hidden devices and compromised connections.
27
Define encryption.
Scrambling data using a code, thereby hiding it from those who do not have the unlocking key.
28
What is a key in the context of encryption?
Code that unlocks encryption.
29
What are brute-force attacks?
Exhausts all possible password combinations to break into an account.
30
What is one benefit of deploying encryption?
Dramatically lowers the potential damage from lost or stolen laptops.
31
What is a major challenge associated with encryption?
Key management is a potentially costly procedural challenge for most firms.
32
What does compliance in cybersecurity refer to?
Legal or professionally binding steps that must be taken.
33
Is compliance equal to security? (True/False)
False.
34
What are some tips for users to improve information security?
* Surf smart * Stay vigilant * Stay updated * Install a full suite of security software * Secure home networks and encrypt hard drives * Regularly update passwords * Use 2FA or MFA when available * Regularly back up your system.
35
What is the role of a red team in cybersecurity?
A group authorized to act like an adversary, probing for weaknesses and testing vulnerabilities.
36
What should firms avoid in cybersecurity spending?
* Spending money targeting unlikely exploits * Underinvesting in methods to thwart common infiltration techniques.
37
What is the purpose of patches in cybersecurity?
Software updates that plug existing holes.
38
What are firewalls used for?
Control network traffic and block unauthorized traffic.
39
What do intrusion detection systems do?
Monitor network use for hacking attempts and take preventive action.
40
What are honeypots in cybersecurity?
Tempting, bogus targets meant to lure hackers.
41
What is the importance of single sign-on tools?
Offer employees one strong password that works across applications.
42
What are some functions of research and development in cybersecurity?
* Understanding emerging threats * Updating security techniques. * Working on broader governance issues.
43
What is a key aspect of failure and recovery plans?
Firms should have provisions in place that plan for the worst.
44
How can AI assist in cybersecurity?
* Cloud-based threat detection * Performing vulnerability audits * Creating honeypots to lure hackers.
45
What is Microsoft's Security Copilot designed for?
It is specifically trained and regularly updated on information security issues, techniques, and vulnerabilities.