Cisco 1 Flashcards

1
Q

the ongoing effort to protect these networked systems and all of the data from unauthorized use or harm

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your Data

A
  1. Data on your computing devices
  2. medical data
  3. employment
  4. information online
  5. your identity
  6. education data
  7. financial data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Every time you go to the doctor’s office, more information is added to your electronic health records (EHRs). The prescription from your family doctor becomes part of your EHR. Your EHR includes your physical health, mental health, and other personal information that may not be medically-related.

A

Medical Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As you progress through your education, information about your grades and test scores, your attendance, courses taken, awards and degrees rewarded, and any disciplinary reports may be in your education record. This record may also include contact information, health and immunization records, and special education records including individualized education programs (IEPs).

A

Education Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your financial record may include information about your income and expenditures. Tax records could include paycheck stubs, credit card statements, your credit rating and other banking information. Your employment information can include your past employment and your performance.

A

Employment and Financial Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your computing devices do not just store your data. Now these devices have become the portal to your data and generate information about you.

A

Your Computing Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Besides stealing your money for a short-term monetary gain, the criminals want long-term profits by stealing your identity.

A

They Want Your Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your online credentials are valuable. These credentials give the thieves access to your accounts. You may think the frequent flyer miles you have earned are not valuable to cybercriminals

A

They Want Your Money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Organizational Data

A
  1. Traditional Data
  2. Internet of Things and Big Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Corporate data includes personnel information, intellectual properties, and financial data.
  • The personnel information includes application materials, payroll, offer letters, employee agreements, and any information used in making employment decisions. Intellectual property, such as patents, trademarks and new product plans, allows a business to gain economic advantage over its competitors.
A

Traditional Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • With the emergence of the Internet of Things (IoT), there is a lot more data to manage and secure. IoT is a large network of physical objects, such as sensors and equipment that extend beyond the traditional computer network
  • This data has created a new area of interest in technology and business called “Big Data”.
A

Internet of Things and Big Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Another term for confidentiality would be privacy.
  • Company policies should restrict access to the information to authorized personnel and ensure that only those authorized individuals view this data.
A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • accuracy, consistency, and trustworthiness of the data during its entire life cycle.
  • Data must be unaltered during transit and not changed by unauthorized entities.
A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

used to verify the integrity of files, or strings of characters, after they have been transferred from one device to another across your local network or the Internet.

A

checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups ensure the availability of the network and data to the authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Consequences of a Security Breach

A
  1. ruined reputation
  2. vandalism
  3. theft
  4. revenue lost
  5. damaged intellectual property
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • online password manager
  • detected unusual activity on its network in July 2015.
  • It turned out that hackers had stolen user email addresses, password reminders, and authentication hashes. Fortunately for the users, the hackers were unable to obtain anyone’s encrypted password vaults
A

LastPass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • The customers had shared photos and used the chat features through the toy tablets.
  • The information was not secured properly, and the company website did not support secure SSL communication
A

Vtech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • one of the nationwide consumer credit reporting agencies in the United States.
  • The attackers exploited a vulnerability in the Apache Struts web application software. The company believes that millions of U.S. consumers’ sensitive personal data were accessed by the cyber criminals between May and July of 2017.
A

Equifax Inc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Types of Attackers

A
  1. Amateurs
  2. Hackers
  3. Organized Hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

application materials. payroll, offer letter, employee agreements

A

personnel

22
Q

patent, trademarks, product plans, trade secrets

A

intellectual

23
Q

income statements, balance sheets, cash flow statements

A

financial

24
Q

large network of physical devices

A

IoT

25
Q

data from IoT

A

Big data

26
Q
  • These people are sometimes called Script Kiddies.
  • They are usually attackers with little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
  • Some of them are just curious, while others are trying to demonstrate their skills and cause harm.
A

Amateurs

27
Q
  • This group of attackers break into computers or networks to gain access.
  • Depending on the intent of the break-in, these attackers are classified as white, gray, or black hats.
A

Hackers

28
Q
  • attackers break into networks or computer systems to discover weaknesses so that the security of these systems can be improved.
  • These break-ins are done with prior permission and any results are reported back to the owner
A

white hat

29
Q
A
30
Q

attackers take advantage of any vulnerability for illegal personal, financial or political gain

A

black hat

31
Q
  • are somewhere between white and black hat attackers
  • may report the vulnerability to the owners of the system if that action coincides with their agenda.
A

Gray hat

32
Q
  • These hackers include organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers.
  • Cyber criminals are usually groups of professional criminals focused on control, power, and wealth.
  • The criminals are highly sophisticated and organized, and they may even provide cybercrime as a service to other criminals.
A

Organized Hackers

33
Q
  • Attacks can be originated from within an organization or from outside of the organization, as shown in the figure.
  • An internal user, such as an employee or contract partner, can accidently or intentionally
A

Internal Security Threats

34
Q

An internal user, such as an employee or contract partner, can accidently or intentionally

A
  • Mishandle confidential data
  • Threaten the operations of internal servers or network infrastructure devices
  • Facilitate outside attacks by connecting infected USB media into the corporate computer system
  • Accidentally invite malware onto the network through malicious email or websites
35
Q

from amateurs or skilled attackers can exploit vulnerabilities in network or computing devices, or use social engineering to gain access.

A

External Security Threats

36
Q
  • Internet-based conflict that involves the penetration of computer systems and networks of other nations.
  • These attackers have the resources and expertise to launch massive Internet-based attacks against other nations to cause damage or disrupt services, such as shutting down a power grid
  • attacks against an enemy state, causing comparable harm
A

Cyberwarfare

37
Q
  • has become another important dimension of warfare, where nations can carry out conflicts without the clashes of traditional troops and machines.
  • This allows countries with minimal military presence to be as strong as other nations in cyberspace
A

Cyberspace

38
Q
  • malware that was designed to damage Iran’s nuclear enrichment plant.
A

Stuxnet

39
Q
  • attack that followed the release of film “The Interview”
  • presented a negative portrayal of Kim Jong Un
A

Sony Pictures Hack

40
Q
  • 2007 where Estonia suffered numbe rof significant cyber attacks
  • Estonian government websites, media outlets, banks were oveload with masive denial of service
A

Bronze Soldier

41
Q
  • crowdstrike claims that Russian organized cybercrime group to target Ukranian rocker forces
A

Fancy Bear

42
Q

7 types of cyberwarfare attacks

A
  1. Espionage
  2. Sabotage
  3. Denial of service attacks
  4. Electrical Power Grid
  5. Propaganda Attacks
  6. Economic Disruption
  7. Surprise Attacks
43
Q
  • attacks against critical infratructure are common
  • Ukrain has been targeted with attacks against its power grid
A

critical infrastructure attacks

44
Q

deny legitimate user access by overwhelming with spam requests

A

distributed denial of service attacks
(DDoS)

45
Q

deny access to important files by encrypting or deleting files

A

ransomware and wipers

46
Q

exploitation happens through SMS

A

smishing

47
Q

scam execution is through voice call

A

vishing

48
Q

deliver malware through email

A

phishing

49
Q

by sowing disinformation to damage nation-state ability to effectively defend itself

A

propaganda

50
Q

infiltrate government and military networks to collect intelligence

A

espionage

51
Q

The Purpose of Cyberwarfare

A
  • gain advantage over adversaries, whether they are nations or competitors.
  • can sabotage the infrastructure of other nations and cost lives in the targeted nations
  • may allow an attacker to pretend to be an authorized user to access sensitive information or equipment.