Cisco 1 Flashcards
the ongoing effort to protect these networked systems and all of the data from unauthorized use or harm
Cybersecurity
Your Data
- Data on your computing devices
- medical data
- employment
- information online
- your identity
- education data
- financial data
Every time you go to the doctor’s office, more information is added to your electronic health records (EHRs). The prescription from your family doctor becomes part of your EHR. Your EHR includes your physical health, mental health, and other personal information that may not be medically-related.
Medical Records
As you progress through your education, information about your grades and test scores, your attendance, courses taken, awards and degrees rewarded, and any disciplinary reports may be in your education record. This record may also include contact information, health and immunization records, and special education records including individualized education programs (IEPs).
Education Records
Your financial record may include information about your income and expenditures. Tax records could include paycheck stubs, credit card statements, your credit rating and other banking information. Your employment information can include your past employment and your performance.
Employment and Financial Records
Your computing devices do not just store your data. Now these devices have become the portal to your data and generate information about you.
Your Computing Devices
Besides stealing your money for a short-term monetary gain, the criminals want long-term profits by stealing your identity.
They Want Your Identity
Your online credentials are valuable. These credentials give the thieves access to your accounts. You may think the frequent flyer miles you have earned are not valuable to cybercriminals
They Want Your Money
Types of Organizational Data
- Traditional Data
- Internet of Things and Big Data
- Corporate data includes personnel information, intellectual properties, and financial data.
- The personnel information includes application materials, payroll, offer letters, employee agreements, and any information used in making employment decisions. Intellectual property, such as patents, trademarks and new product plans, allows a business to gain economic advantage over its competitors.
Traditional Data
- With the emergence of the Internet of Things (IoT), there is a lot more data to manage and secure. IoT is a large network of physical objects, such as sensors and equipment that extend beyond the traditional computer network
- This data has created a new area of interest in technology and business called “Big Data”.
Internet of Things and Big Data
- Another term for confidentiality would be privacy.
- Company policies should restrict access to the information to authorized personnel and ensure that only those authorized individuals view this data.
Confidentiality
- accuracy, consistency, and trustworthiness of the data during its entire life cycle.
- Data must be unaltered during transit and not changed by unauthorized entities.
Integrity
used to verify the integrity of files, or strings of characters, after they have been transferred from one device to another across your local network or the Internet.
checksum
Maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups ensure the availability of the network and data to the authorized users.
Availability
The Consequences of a Security Breach
- ruined reputation
- vandalism
- theft
- revenue lost
- damaged intellectual property
- online password manager
- detected unusual activity on its network in July 2015.
- It turned out that hackers had stolen user email addresses, password reminders, and authentication hashes. Fortunately for the users, the hackers were unable to obtain anyone’s encrypted password vaults
LastPass
- The customers had shared photos and used the chat features through the toy tablets.
- The information was not secured properly, and the company website did not support secure SSL communication
Vtech
- one of the nationwide consumer credit reporting agencies in the United States.
- The attackers exploited a vulnerability in the Apache Struts web application software. The company believes that millions of U.S. consumers’ sensitive personal data were accessed by the cyber criminals between May and July of 2017.
Equifax Inc.
Types of Attackers
- Amateurs
- Hackers
- Organized Hackers