Cybersecurity Module Flashcards
What is ethical hacking
Ethical hacking involves testing security of computer systems, networks, web applications
Tested by simulating attacks from malicious hackers to identify vulnerabilities and weaknesses in system or network, to help organisation strengthen its security
What is purpose of ethical hacking
Strengthen organisations security measures by identifying & resolving security weaknesses before they can be exploited by attackers
Forsee potential security threats, develop robust security protocols to prevent security breaches
Demonstrate to clients & stakeholders that organisation values data protection, committed to safeguarding information
What is penetration testing
Simulating attack on a specific part of organisation’s infrastructure such as network, application, device.
Deliberately try to exploit security vulnerabilities to see if unauthorised access or other malicious activities are possible
What is black box penetration testing
Tester has no prior knowledge of network infrastructure
What is grey box penetration testing
Tester has partial knowledge of network infrastructure
What is white box penetration testing
Tester has full knowledge of network infrastructure
What is process of penetration testing
1) Planning, Obtaining Info
2) Scanning, Gaining Access
3) Maintaining Access, Analysing Risk
4) Reporting Findings
What are properties of ethical hacking
Authorisation: Performed with permission under contract
Purpose: Intend to improve system security
Reporting: Results privately reported to organisation
What are properties of unethical hacking
No Authorisation: Performed Without permission, violates legal boundaries
Malicious Interest: Aims to steal, damage, disrupt operations
Misuse of Data: Exploit vulnerabilities, lead to theft, leaks, data damage
What is role of privacy act 1988
Regulates handling of personal information about individuals
Protects personal information handled by federal government agencies, certain private sector organisations
All Australian & Norfolk Island government agencies, private sector & not-for-profit organisations (> $3 million), all private health providers, small businesses
What is APP 1
Open and Transparent Management of Personal Information
What is concept of australian privacy principles
13 principles, outlines standards/rights/obligations for handling/accessing/correction of personal info
Provide the base framework for how personal data must be treated
What is APP 6
Use of Disclosure of Personal Information
What is APP 11
Security of Personal Information
What is authentication
Verify identity of users trying to access network resources
Authentication usually requires something the user knows (Password / Security Token / Biometrics)
What is characteristics of strong passwords in authentication
12-16 characters
Upper & Lower case, numbers, symbols
Avoid common words, phrases, easily guessable info
Different passwords every website
What is organisational approach to password policies in authentication
Change password every 3-6 months
Teach employees about importance
Use controls to ensure compliance with password policies
Regular checks ensure policies are followed & effective
What is password policies impact on data security in authentication
Strong policies minimise risk of data breaches
Encourage users to take responsibility for own security
Meet requirements for data protection