Chapter 9: Cybersecurity and Privacy Flashcards
Provide examples of security failures that can result in a privacy breach
Unpatched software bugs
Poorly configured security mechanisms
Reuse of credentials
List the NICE framework security categories
- Securely provision
- Operate and maintain
- Protect and defend
- Investigate
- Analyze
- Oversee and govern
- Collect and operate
What does securely provision encompass within the NICE framework?
The tasks narrowly focused on developing software to be secure
What does operate and maintain encompass within the NICE framework?
The operation and maintenance of a system is just as critical to its security and privacy goals as the way the system is created in the first place
Other aspects of operating a system as defined by the NICE framework include systems analysis, which examines the interoperation of an organization’s systems, and knowledge management, which focuses on the processes and tools for ensuring that an organization can keep track of the systems it has created and how to operate them
What does protect and defend encompass within the NICE framework?
Part of attempting to ensure that a system will not be compromised is actively protecting the system
This includes vulnerability assessment and management
What does investigate encompass within the NICE framework?
(1) discovering what specific data may have been compromised
(2) discovering the specific method of compromise
(3) identifying who perpetrated an attack
What infrastructure can be used to protect and defend?
Firewalls that prevent malicious network traffic and monitoring systems that make it possible to detect attacks
What is cyber defense analysis?
Using defensive components to prevent or detect attacks
What is incident management?
It is the process of documenting the details of the attack, determining the impact of the attack on the system and then deciding on the appropriate actions
What are software vulnerabilities?
The software bugs that an attacker can take advantage of to carry out an attack
Not every bug is a vulnerability
How does malware get on a computer?
Malware is installed on a victim user’s computer either by the exploitation of a software vulnerability or at a time when the attacker has unfettered access to the computer—for example, when software is being loaded onto the computer before the computer is sold
What do you call malware that has modified system functions to disguise itself?
Rootkit
What is a bot-net?
When malware coordinates with command-and-control servers to put large sets of computers under the control of a single organization; such a set of computers is called a botnet, and each of the infected computers a bot
How do bot-nets mount distributed denial-of-service (DDoS) attacks?
The computers that are part of a botnet are instructed to connect to or interact with a victim server; if the botnet is large enough, the victim server may be overwhelmed with requests and crash
What is phishing?
A type of social engineering attack in which a victim is tricked into logging in to what they think to be a legitimate site
What is spear phishing?
Attackers customize their messages to include personal information they have already uncovered about the victim
What is whaling?
Spear phishing attacks directed at high-value individuals
Define the confidentiality property
Refers to keeping sensitive data away from unauthorized users, including attackers
Also called secrecy