Cybersecurity - Fundamentals Flashcards

1
Q

Cybersecurity

A

Cybersecurity is about protecting information and systems from cyber threats like hackers and malware. It involves preventing, detecting, and responding to attacks.
πŸ“Œ Example: A bank uses firewalls, encryption, and monitoring tools to protect customer data from hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security vs. Safety

A

Security means protecting against attacks (e.g., hacking).
Safety means protecting against accidents or mistakes (e.g., system errors).
πŸ“Œ Example: Security is stopping a hacker from stealing data, while safety is making sure a software bug doesn’t crash a hospital system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cybersecurity Protection Goals (CIA Triad)

A

1️⃣ Confidentiality πŸ”’ (Keep Data Private)

Only the right people can access the data.
βœ… Uses encryption, passwords, and access controls.
πŸ“Œ Example: Your bank info is encrypted so only you can see it.
2️⃣ Integrity πŸ›‘οΈ (Keep Data Correct)

Prevents data from being changed or corrupted.
βœ… Uses checksums, digital signatures, and hashing.
πŸ“Œ Example: A digital signature ensures a document hasn’t been altered.
3️⃣ Availability ⚑ (Keep Data Accessible)

Ensures data is available when needed.
βœ… Uses backups, redundancy, and DDoS protection.
πŸ“Œ Example: A website stays online even if many users visit at once.

βœ… The CIA Triad is the foundation of cybersecurity, ensuring data stays safe, correct, and available! πŸš€

Two extra goals added later:
4️⃣ Authenticity – Making sure users and systems are who they claim to be.
πŸ“Œ Example: Two-factor authentication (2FA) helps confirm a user’s identity.

5️⃣ Non-repudiation – Preventing someone from denying they sent or received data.
πŸ“Œ Example: Digital signatures ensure an email really came from the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybersecurity Assumptions

A

We use cybersecurity assumptions to prepare for threats before they happen and build stronger defenses.

Why Are They Important?
βœ… No system is 100% secure – Hackers will always try to break in.
βœ… Users make mistakes – People click on bad links or use weak passwords.
βœ… Attackers keep evolving – New threats appear all the time.
βœ… Security tools can fail – Firewalls and antivirus aren’t perfect.

Example:
πŸ“Œ β€œWe assume hackers will try to attack, so we use strong passwords and encryption to stop them.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyber Kill Chain

A

A step-by-step model that describes how cyberattacks happen. It has seven stages:

7 Steps of a Cyber Attack:
1️⃣1️⃣ Robbers β†’ Reconnaissance πŸ” (Looking for a target)

Hackers search for weaknesses, like weak passwords or old software.
2️⃣ Will β†’ Weaponization βš”οΈ (Making the attack tool)

They create a virus, phishing email, or fake website to trick people.
3️⃣ Definitely β†’ Delivery πŸ“© (Sending the attack)

The hacker sends the virus through an email, website, or USB.
4️⃣ Enter β†’ Exploitation πŸ’₯ (Breaking in)

The virus activates when the victim clicks a link or opens a file.
5️⃣ Inside β†’ Installation πŸ—οΈ (Setting up a secret door)

The hacker installs hidden access to return later.
6️⃣ Cash β†’ Command & Control πŸŽ›οΈ (Taking control)

They control the system remotely, stealing info or spying.
7️⃣ Area β†’ Actions on Objectives 🎯 (Stealing or damaging data)

The hacker steals files, locks the system, or demands money.

πŸ“Œ Example: A hacker sends a phishing email with a fake invoice that installs malware on a company’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk in Cybersecurity

A

1️⃣ What is Risk?
πŸ“Œ β€œCyber risk is the chance that a cyber attack will harm a system or data.”

2️⃣ Three Parts of Risk
Threat ⚠️ – Hackers, viruses, phishing.
Weakness πŸ”“ – Weak passwords, outdated software.
Damage πŸ’₯ – Stolen data, money loss.
3️⃣ Example
πŸ“Œ β€œA weak password lets a hacker steal data, causing damage.”

4️⃣ How to Reduce Risk?
βœ… Find risks (check for weaknesses).
βœ… Fix risks (strong passwords, updates).
βœ… Watch for risks (monitor for attacks).

How to Remember?
πŸ”Ή Risk = Threat + Weakness + Damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Matrix

A

A Risk Matrix helps us understand and rank cybersecurity risks by looking at:

Likelihood:
βœ… How likely something bad is to happen (Low, Medium, High).
βœ… How bad the damage would be (Low, Medium, High).

Impact:
Risk Levels:
🟒 Low Risk – Not likely, small problem. βœ…
🟑 Medium Risk – Might happen, moderate problem. ⚠️
πŸ”΄ High Risk – Very likely, big problem. 🚨

Example:
πŸ“Œ Using a weak password

How likely? High (many people do it).
How bad if hacked? High (data can be stolen).
Fix it? Use strong passwords! πŸ”‘
βœ… A Risk Matrix helps decide which risks to fix first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threats, Vulnerabilities, and Attacks

A

Threat – A potential danger to cybersecurity.
Vulnerability – A weakness that hackers can exploit.
Attack – The actual attempt to exploit a vulnerability.
πŸ“Œ Example: A weak password is a vulnerability, and a hacker guessing it is an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack Trees

A

A diagram that shows all possible ways an attacker could reach their goal.
πŸ“Œ Example: A hacker wants to steal data from a company. The attack tree shows multiple ways to break in, like phishing, weak passwords, or exploiting software bugs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

STRIDE Threat Model

A

The STRIDE model helps identify and prevent cybersecurity threats in a system. It is used to find weaknesses before hackers exploit them.

1️⃣ Spoofing – Pretending to be someone else.
πŸ“Œ Example: A hacker fakes an email address to impersonate a boss.

2️⃣ Tampering – Changing or modifying data.
πŸ“Œ Example: A hacker modifies a transaction to send money to their account.

3️⃣ Repudiation – Denying an action was taken.
πŸ“Œ Example: A user deletes logs to hide evidence of unauthorized access.

4️⃣ Information Disclosure – Leaking sensitive data.
πŸ“Œ Example: A hacker steals credit card numbers from a website.

5️⃣ Denial of Service (DoS) – Overloading a system to make it unavailable.
πŸ“Œ Example: A hacker floods a website with fake traffic, making it crash.

6️⃣ Elevation of Privilege – Gaining unauthorized access.
πŸ“Œ Example: A hacker finds a bug that lets them become an admin on a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MITRE ATT&CK Framework

A

MITRE ATT&CK is a detailed list of hacker techniques used in real attacks, helping experts track, detect, and stop threats inside a system

MITRE ATT&CK divides cyberattacks into different tactics (goals hackers try to achieve). Here are the main 11 tactics:

1️⃣ Getting In πŸ”“ – Hackers use phishing or weak passwords.
2️⃣ Running the Attack πŸ’» – Malware starts working.
3️⃣ Hiding 🎭 – Hackers avoid detection.
4️⃣ Spreading πŸ”„ – Moving to other devices.
5️⃣ Stealing Data πŸ“¦ – Taking sensitive files.
6️⃣ Causing Damage πŸ’₯ – Ransomware, deleting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybersecurity Frameworks

A

β€œCybersecurity frameworks are guidelines that help organizations protect their systems and data from cyber threats.”

What They Do:
βœ… Help companies stay secure (rules to follow).
βœ… Manage cyber risks (identify threats & fix weak spots).
βœ… Respond to attacks (how to react when hacked).

Examples:
NIST – Helps businesses build a cybersecurity plan.

NIS is a set of EU cybersecurity rules that protect critical services like energy, banking, and healthcare from cyber threats. It requires companies to improve security, report cyber incidents, and prevent attacks to keep essential systems safe

NIST has 5 simple rules to keep systems safe:

1️⃣ Identify πŸ” – Find risks.
2️⃣ Protect πŸ”’ – Secure systems.
3️⃣ Detect 🚨 – Spot attacks.
4️⃣ Respond πŸ› οΈ – Take action.
5️⃣ Recover πŸ”„ – Fix damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Threats in Denmark

A

Denmark faces cyber threats like:
1️⃣ Cyber Espionage – Foreign hackers spying on Denmark.
2️⃣ Cyber Crime – Hackers stealing money or data.
3️⃣ Cyber Activism – Political hacking (e.g., defacing websites).
πŸ“Œ Example: In 2023, Danish energy companies were targeted by cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cybersecurity in Denmark

A

Denmark follows several cybersecurity strategies:

CFCS (Center for Cyber Security) monitors national threats.
Danish Cybersecurity Strategy protects critical systems like energy and healthcare.
πŸ“Œ Example: CFCS warns Danish companies about Russian cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Danish Cybersecurity Law (NIS 2)

A

The NIS 2 directive forces Danish companies to improve security or face fines.
πŸ“Œ Example: Hospitals must report cyber incidents within 72 hours or pay penalties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incident Reporting

A

Companies must report cyber incidents quickly to minimize damage.
πŸ“Œ Example: A bank notifies the authorities within 24 hours after detecting a hacking attempt.

16
Q

Cyber Diplomacy

A

Cyber Diplomacy is when countries work together to set rules, prevent cyber conflicts, and improve global cybersecurity. It helps nations cooperate on cyber threats, fight cybercrime, and promote a safer internet. πŸš€

17
Q

Public-Private Cybersecurity Cooperation

A

Governments and businesses share information about cyber threats to improve security.
πŸ“Œ Example: CFCS warns Danish banks about an ongoing phishing campaign.