Cybersecurity Flashcards

1
Q

Cybersecurity definition

A

technique of protecting internet-connected systems and data from computer attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybersecurity tasks

A
  • Guaranteeing confidentiality of information
  • Protection from unauthorized access
  • Ensuring availability of resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA triad

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

= protecting from access of unauthorized users
Tools:
- Encryption: making info unreadable for unauthorized users (encryption + decryption key)
- Access Control: rules and policies for limiting acess (credentials + privileges)
- Authentication: cofmiring user identity (credentials)
- Authorization: verifying authenticated user’s access rules (privilges)
- Physical security: depends from legislation, physical access to IT infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

= authentic, accurate data, safeguarded by unauthorized modifications
Tools:
- checksum: to verify that data is in original format, as data changes output of checksum changes
- backups: periodi duplication of data
- data correcting codes: storing data so that small changes can be detected and corrected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

= information available always for authorized users
Tools:
- computational redundancies
- Physical protection: info available during physical challenges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why cybersecurity

A
  • attack technology develops in open source environment -> fast
  • many weak systems connected to the internet
  • attacksa transcend national borders
  • defensive strategies are reactionary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybersecurity principles

A
  1. Risk management regime: establishing and communicating cibersecurity policies
  2. Secure configuration: e.g. disabling useless functions
  3. Network security
  4. Managing user privileges -> minimum priv
  5. User education and awareness
  6. Incident management
  7. Malware preventions: anti-virus for business practices more exposed to attacks
  8. Monitoring
  9. Removable media control
  10. Home and remote connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyberattack definition

A

exploitation of a computer system or network, it uses malicious code to alter a computer’s logica, data or code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Actors of cyberattacks

A

States
Organizations
Administrators and Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are cyberattacks damaging

A

Reasons of state
Economic reasons
- financial loss
- customer loss
- legal costs
- recovery and additional technology
- stock market loss
- production loss
Ethical and social reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cyberattacker definition

A

Individual or organization who performs malicious activities to destry, alter, make unauthorized use of an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of cyberattackers

A
  • Hacktivist: political agenda, religious belief, social ideology
  • State-sponsored: aligned objectives
  • Insider threat: from within, can be malicious, accidental, negligent (avoid organization’s cybersecurity policies)
  • Cybercriminal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cybercriminal types

A

Ransom artist
hacker
rogue employee
spear phisher
social engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of cybercrimes

A

Spoofing
Identity theft
Phishing
Non-payment
Personal data breach
Extortion
Confidence/Romance fraud
Misrepresentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Reasons why cyber attacks are possible

A
  • organization’s weakness
  • user weakness
  • technological wekaness
    • technological problem
      • programming: bugs, complexity
      • environment (network)
      • design (authentication)
      • security control
    • application problem
      • sensitive info in cookies
      • password stored without encryption in db
      • inventing a protection system
      • buffer overflow
17
Q

Kinds of cyber attacks

A
  • hacking: system penetration by a hacker
  • Error
  • Malware
  • social: exploit user ignorance
18
Q

Kinds of cyber attacks (based on)

A

System based
- worm
- virus
- backdoor
- trojan horse
- bots
Web based
- DNS spoofing
- URL interpretation
- brute force
- Man in the middle
- File inclusion attacks
- Dictionary attacks
- Session hijacking
- phishing
denial of service