Information Assurance - 6 Flashcards

1
Q

It refers to an incident in which an unauthorized party gains access to confidential, sensitive, or protected information or resources. Typically, it occurs when an intruder is able to bypass security mechanisms.

A

Security Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nature of Breaches

A
  1. DATA THEFT
  2. MALWARE ATTACK
  3. UNAUTHORIZED ACCESS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type of breach where unauthorized individuals gain access to sensitive information, such as personal data, financial records, or intellectual property, with the intention of using it for malicious purposes or financial gain.

A

DATA THEFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

when individuals or entities gain entry to a system, network, or application without proper authorization. This could involve exploiting weak passwords, bypassing authentication measures, or taking advantage of misconfigured permissions.

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • refers to software designed to disrupt, damage, or gain unauthorized access to computer systems. Malware attacks can take many forms, such as viruses, worms, ransomware, or spyware.
  • These attacks often exploit vulnerabilities in software or trick users into downloading infected files
A

MALWARE ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

occurs when individuals or entities gain entry to a system, network, or application without proper authorization. This could involve exploiting weak passwords, bypassing authentication measures, or taking advantage of misconfigured permissions.

A

UNAUTHORIZED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common Vulnerabilities of Security Breach

A
  1. Weak Authentication
  2. Lack of Encryption
  3. Unpatched Software
  4. Misconfigured Systems
  5. Vulnerable Third-party Software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Different Platforms Affected by security breach

A
  1. NETWORK INFRASTRACTURE
  2. DATABASE SYSTEMS
  3. APPLICATIONS AND SOFTWARE
  4. CLOUD SERVICES
  5. ENDPOINT DEVICES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • This can lead to unauthorized access to internal systems and data, as well as interception of network traffic (Cisco, 2024).
  • Breaches may target the organization’s network infrastructure, compromising routers, switches, firewalls, and other networking components.
A

NETWORK INFRASTRACTURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Refers to any unauthorized access, disclosure, or manipulation of data stored within a database.
  • occur due to various factors, including vulnerabilities in the database software, weak authentication mechanisms, misconfigurations, insider threats, or external cyber attacks.
A

DATABASE SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Platforms affected by security breaches refer to computing environments or systems that have experienced unauthorized access, disclosure, or manipulation of data. This could include various types of platforms such as operating systems (e.g., Windows, Linux), cloud computing platforms (e.g., AWS, Azure), web hosting services, or even specific hardware platforms.

A

APPLICATIONS AND SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Organizations increasingly rely on cloud services for storage, computing, and other business functions. Breaches targeting cloud services can compromise data stored in the cloud, affecting multiple users or organizations that share the same cloud infrastructure (Citrix).

A

CLOUD SERVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Breaches may target endpoint devices, such as desktop computers, laptops, smartphones, and tablets, either through malware infections, phishing attacks, or physical theft.
  • Compromised endpoint devices can provide attackers with access to sensitive data and resources within the organization’s network. (TechTarget, 2023).
A

ENDPOINT DEVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Causes of the Breach

A
  1. WEAKNESSES IN SECURITY MEASURES
  2. HUMAN ERROR / NEGLIGENCE
  3. SOPHISTICATION OF THE ATTACK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Weaknesses in security measures refer to gaps or vulnerabilities in the organization’s security infrastructure that could be exploited by attackers to gain unauthorized access or compromise sensitive information.

A

WEAKNESSES IN SECURITY MEASURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

attackers craft personalized and convincing emails to deceive specific individuals within the organization, can be an example of a sophisticated attack

A

SOPHISTICATION OF THE ATTACK

16
Q

Impacts of the Breach

A
  1. DATA COMPROMISED
  2. FINANCIAL LOSSES
  3. REPUTATIONAL DAMAGE
  4. LEGAL AND REGULATORY CONSEQUENCES
17
Q

refers to the unauthorized access, theft, or exposure of sensitive information, potentially leading to its misuse, manipulation, or disclosure to unauthorized parties.

A

DATA COMPROMISED

18
Q

result from the direct costs associated with mitigating the breach, recovering from its impacts, and potential revenue loss due to business disruption or loss of customer trust.

A

FINANCIAL LOSSES

19
Q

refers to the harm inflicted on an organization’s reputation and brand image as a result of a security breach, leading to loss of trust and credibility among customers, partners, and stakeholders.

A

REPUTATIONAL DAMAGE

20
Q

encompass the legal liabilities, fines, penalties, and compliance violations that organizations may face for failing to adequately protect sensitive data or adhere to relevant data protection laws and regulations.

A

LEGAL AND REGULATORY CONSEQUENCES

21
Q

Response to the Breach

A
  1. IMMEDIATE ACTIONS TAKEN
  2. COMMUNICATION WITH AFFECTED PARTIES
  3. STEPS TAKEN FOR PREVENTION
21
Q

refer to the initial response measures implemented by the organization immediately following the discovery of a security breach to contain the incident to minimize its impact.

A

IMMEDIATE ACTIONS TAKEN

22
Q

involves notifying individuals, customers, employees, regulatory authorities, and other stakeholders about the security breach, its impact, and the steps being taken to address the situation and protect their interests.

A

COMMUNICATION WITH AFFECTED PARTIES

23
Q

involve implementing remediation measures and security controls to prevent the recurrence of similar security incidents, strengthen security defenses, and safeguard against future threats.

A

STEPS TAKEN FOR PREVENTION

24
Q

Preventive Measures in security breach

A
  1. Firewalls and Intrusion Detection Systems (IDS)
  2. Strengthening Security Infrastructure
  3. EMPLOYEE TRAINING AND AWARENESS PROGRAMS
  4. IMPLEMENTATION OF ENCRYPTION AND ACCESS CONTROLS
25
Q

cybersecurity tools used to monitor and protect computer networks. Firewalls regulate incoming and outgoing network traffic based on predefined security rules, while IDS detect and alert on suspicious activities or potential security breaches within the network.

A

Firewalls and Intrusion Detection Systems (IDS)

26
Q

regulate incoming and outgoing network traffic based on predefined security rules

A

Firewalls

27
Q

detect and alert on suspicious activities or potential security breaches within the network.

A

Firewalls and Intrusion Detection Systems (IDS)

28
Q

aim to educate staff members about cybersecurity risks, best practices, and their role in maintaining a secure work environment.

A

EMPLOYEE TRAINING AND AWARENESS PROGRAMS

29
Q

involves enhancing the organization’s technological defenses and safeguards to protect against cybersecurity threats. It acts as the first line of defense against a variety of threats, safeguarding not just the immediate integrity of technology systems but also ensuring long-term business viability.

A

Strengthening Security Infrastructure

30
Q

involves safeguarding sensitive data by encrypting it during transmission and storage, and controlling access to data based on user permissions.

A

IMPLEMENTATION OF ENCRYPTION AND ACCESS CONTROLS