cybersecurity Flashcards
cybersecurity
availability, integrity, authentication, confidentiality, and nonrepudiation
when was cybersecurity developed?
U.S. Air Force in 1976
MIT Research scientist David Clark and David Wilson
Concept of developing security policies concerning info security (INFOSEC) was formalized
What is the most common model of cybersecurity?
CIA Triad
CIA
Confidentiality, Integrity, Availability
what is Confidentiality
info only available to some
what is an example of confidentiality
example: FERPA and HIPAA
what is integrity
data that should be maintained in a correct state and should not be modified
what is availability
makes sure that authorized people have access to info when and where it is rightly needed
How is availability ensured?
it is implemented using traditional methods such as hardware maintenance, software patching and network optimization
availability
process such as system redundancy, failover, RAID and High availability cluster are used to weaken serious consequences when hardware issues occur
what is Dedicated Hardware Devices Can Be Used to Guard Against Downtime and Unreachable Data Due to Malicious Distributed Denial-of-Service (DDoS) Attacks, a part of?
availability
should you have access to the info?
confidentiality
do i trust the data?
integrity
am i able to access the data when i want?
availability
social engineering
people
Social Engineering
Use to Get Victims to Take Some Sort of Questionable Action Through Deception, Often Involving a Breach of Security That Oftentimes Includes Revealing Confidential or Private Information or Sending Money (in person or technology)
what can Social Engineering do?
manipulate our emotions
phishing
people
phishing
Uses Email, Phone or Text to Entice Individuals into Providing Personal or Sensitive Information, Ranging From Passwords, Credit Card Information and Social Security Numbers to Details About a Person or Organization (only on technology)
i.e. scam emails or fake website
spear phishing
email or Electronic Communications Scam Targeting Specific Individual, Organization or Business
SMiShing
scam through text
what can phishing download
malware/ viruses, modern ware/ stuxnet, ransomware, denial of service/ botnet
password protection
12-15 characters
keep it weird
don’t bunch up special characters
don’t use the same password
change once a year
use multi-factor authentication
people
people - threats
social engineering
phishing
spear phishing
smishing
password
social engineering
phishing
spear phishing
smishing
password
confidentiality
Technology
Zero Day Exploit
Deletion/Hardware Failure
RFID Hacking
(Distributed) Denial of Service (DDoS / DOS)
availability
Zero Day Exploit
Deletion/Hardware Failure
RFID Hacking
(Distributed) Denial of Service (DDoS / DOS)