CyberS C1 Flashcards
What is Cybersecurity?
Cybersecurity is the practice of protecting computer systems, networks, and data from digital threats, attacks, and unauthorized access
What are the responsibilities of businesses in the cybersecurity world regarding data?
Businesses in the cybersecurity world have the responsibility to collect and harness the power of data and analytics. They must protect this data from misuse and unauthorized access to ensure the growth of data creates opportunities for cybersecurity specialists.
What risks are associated with the growth of data collection and analytics in the cybersecurity domain?
The growth in data collection and analytics poses risks to individuals and modern life if precautions are not taken to protect sensitive data from criminals or others with harmful intent.
Differentiate between white hat, gray hat, and black hat attackers
White hat attackers break into networks to improve security, gray hat attackers may report vulnerabilities Matching with their agenda, while black hat attackers violate security for personal gain or malicious reasons
What are the motives of script kiddies, vulnerability brokers, and hacktivists in the realm of cybersecurity?
Script kiddies, often teenagers or hobbyists with limited skills, engage in pranks and vandalism. Vulnerability brokers are grey hat hackers discovering exploits for rewards, and hacktivists protest against political or social ideas through various means.
Provide examples of different types of cyber criminals and their motives
Cyber criminals come in various forms, such as script kiddies engaging in pranks, vulnerability brokers seeking exploits, hacktivists protesting against organizations, and state-sponsored hackers involved in espionage and sabotage
What factors contribute to the spread and growth of cybercrime?
Spread || unproctected data and a lack of CyberS meassures
Growth || a growth a tech incing attack surfaces and a connectivity and dependence of Digital sys
Analyze the efforts committed to expanding the cybersecurity workforce
Organizations and efforts are dedicated to expanding the cybersecurity workforce, reflecting the recognition of the importance of skilled professionals in addressing the challenges in the cybersecurity domain
organization and efforts reflect the recognition of the importance of skilled professionals in addressing the challenges in the CyberS domian
Provide examples of Information Security Management Standards
Information Security Management (ISM) Standards, such as ISO 27000, offer a framework for implementing cybersecurity measures within organizations
How do new laws contribute to cybersecurity efforts, and can you name a few examples?
New laws, tracked by groups like ISACA, address cybersecurity, ranging from individual privacy to the protection of intellectual property. Examples include the Cybersecurity Act, Federal Exchange Data Breach Notification Act, and the Data Accountability and Trust Act
Define the term “cyber vulnerability’’
A cyber vulnerability is a weakness that makes a target vulnerable to an attack in the cybersecurity domain
List some examples of data sources that can be targeted by cyber criminals
Examples include personal information, medical records, education records, employment, and financial records
Explain the threats associated with network services like DNS, HTTP, and online databases
Cyber criminals often target network services like DNS and use packet-sniffing tools to capture data streams. Rogue devices, such as unsecured Wi-Fi access points, and packet forgery are common techniques
Differentiate between internal and external security threats
Internal security threats originate from within an organization, potentially causing greater damage due to direct access and insider knowledge. External threats, from amateurs or skilled attackers, exploit vulnerabilities or use social engineering to gain access
What challenges do mobile devices pose in terms of cybersecurity, and why is Bring Your Own Device (BYOD) a growing trend?
Mobile devices, including BYOD, pose challenges in central management and updates, becoming a growing threat as more people use them to access enterprise information