? From Slides Flashcards
What are we protecting in cybersecurity?
Data, systems, networks, intellectual property.
Who are we protecting assets from?
Hackers, insiders, malware, nation-states.
Why do we need to protect systems and data?
To ensure confidentiality, integrity, and availability (CIA Triad).
Does more complexity mean less security?
No, unnecessary complexity increases errors and vulnerabilities.
Is goodwill a problem in security?
Yes, attackers can exploit trust through social engineering or insider threats.
What assets do we need to protect?
Data, software, hardware, networks, personnel.
How are assets threatened?
Malware, phishing, DoS, man-in-the-middle, insiders.
How can we counter threats to assets?
Firewalls, encryption, MFA, IDS, and user training.
Are all attacks intelligent?
No, some like DoS are simple but effective.
Is prevention always possible?
No, detection and recovery are crucial.
What are four types of active attacks?
Masquerade, Replay, Modification, DoS.
What are passive attacks?
Eavesdropping, traffic analysis; hard to detect.
Why is DES limited to 56-bit keys?
NSA and IBM compromised to balance security and performance.
What are ECB mode’s advantages and disadvantages?
Fast but vulnerable to replay and pattern attacks.
How to deal with non-block data in encryption?
Use stream ciphers or padding.