Cybersecurity Flashcards

1
Q

What are the reasons for a system attack? 1

A
  • Fun/Challenge.
  • Industrial espionage.
  • Financial gain.
  • Personal attack/revenge.
  • Disruption.
  • Data and information theft.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the main external threats to data security? 2

A
  • Hacking/Malware.
  • DOS attacks.
  • Phishing/Pharming.
  • Social engineering/Shoulder surfing.
  • Man-in-the-middle attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the main internal threats to data security? 3

A
  • Untrustworthy sites/downloads.
  • Unintended/Intended data discloure/leaking.
  • Overriding of security.
  • Portable storage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the system impacts of a security breach? 4

A
  • Data may not be recoverable.
  • Future profits, finances may be affected.
  • Digital system downtime.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the social/employee impacts of security breach? 5

A
  • Damage to reputation.
  • Reduced staff productivity.
  • Legal action and fines against them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the benefits and drawbacks of physical security measures? 6

A
\+Difficult to remove locks.
\+Digital locks record user access.
-Keys/cards can be lost or copied.
-Expensive.
-Portable devices cannot be protected this way.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits and drawbacks of password security measures? 7

A

+Simple and cheap.

  • Complex can be hard to remember.
  • Do not protect from social engineering.
  • Specialist software can deduce passwords.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the benefits and drawbacks of biometric security measures? 8

A

+No need to remember.
+Unique to the individual.
-Expensive.
-Can be spoofed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the benefits and drawbacks of user access restrictions? 9

A

+Users can view without being allowed edits.

  • Complex to set up and manage.
  • Must be set to the correct level for everyone.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the benefits and drawbacks of 2FA? 10

A

+Higher security level.
+Only need to remember password.
-Required additional hardware and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the benefits and drawbacks of firewalls? 11

A

+Blocks malicious data.
+Easy to install, can be configured.
-Can be expensive and complex.
-Can block genuine traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the benefits and drawbacks of password remembering software? 12

A

+Protects against shoulder surfing.
+No need to remember passwords.
+Speeds up logins.
-Stolen devices become a huge security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the benefits and drawbacks of antivirus software? 13

A

+Protects well against known malware.

-Must be regularly updated for new signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the benefits and drawbacks of device hardening? 14

A

+Protects from a range of attacks.

-Requires up to date skilled technical staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you harden a device? 15

A
  • Restrict user access.
  • Install firewall/security patches/antivirus.
  • Remove old software and accounts.
  • Use strong passwords, change default ones.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should a backup procedure include? 16

A
  • Weekly/Daily?
  • Automatic/Manual?
  • Physical backups should be in a fireproof box, offsite.
  • Recovery procedure for reinstating backups.
17
Q

What is encryption, what are its downsides? 17

A
  • Sensitive data (files or whole disk) is scrambled.
  • Data is lost if key is lost.
  • Can be stolen if encryption is weak.
18
Q

What are the types of hacker? 18

A
  • Black hat commits crimes for their own good.
  • Grey hat commits crimes but not for personal gain.
  • White hats are endorsed by companies and hack for a living to find security weaknesses.
19
Q

What are the benefits and drawbacks of pen testing? 19

A
\+Uses hacker methods, realistic insight.
\+Vulnerabilities can be fixed.
-Not always fully accurate.
-Expensive.
-Needs to be done regularly.
20
Q

What is covered by company security policies? 20

A
  • Internet/Email usage.
  • External and personal devices.
  • Passwords.
  • Software.
  • Backup/Hardening.
  • Disposal of equipment/data.
21
Q

What should a strong password policy advise? 21

A
\+Long passwords.
\+Letters/Mixed cases/Symbols/Numbers.
\+Change regularly.
-Single word, especially names.
-Write it down/share it.
22
Q

What are the issues with installing non-approved software? How can software rules be enforced? 22

A
  • Licensing issues/cost. Malware infection risk. IT support issues and incompatability.
  • Prevent installation, deny admin rights, white list allowed software.
23
Q

What types of disaster cause data loss? What should a disaster recovery policy cover? 23

A
  • Cyberattack, data loss, equipment failure, natural disaster or terrorist attack.
  • Back up process and frequency, where to operate from, recovery timeline.
24
Q

What do you do after an attack? 24

A
  • INVESTIGATE: Type/Severity.
  • RESPOND: Inform stakeholders/authorities.
  • MANAGE: Contain the attack.
  • RECOVER: Disinfect and restore.
  • ANALYSE: Identify source, modify procedures.