Information Systems Security Flashcards
Cybersecurity Professionals and Their Tasks
What is Cybersecurity?
Cybersecurity is like a shield that keeps your digital stuff safe from bad guys. These bad guys try to break into your computers, networks, and programs to steal or mess up important information, get money from you, or disrupt your work.
To make this shield strong, you need different layers of protection for your computers, networks, and data. In a company, it’s not just about the technology. People and how they work together also play a big role in keeping everything safe. So, it’s like a team effort to guard against cyber attacks.
Cybersecurity professionals have several important tasks
- Stay Informed: They keep up with the latest technology and security threats through various sources.
- Threat Analysis: They analyze and assess potential threats to understand their significance.
- System Checks: They regularly review systems to identify and address any security weaknesses.
- Security Measures: They implement security measures and establish protocols to protect systems and data.
- Reporting: They create reports for company stakeholders to keep them informed about security status.
- Education: They educate others in the company about the importance of security.
Four (4) Cybersecurity Career Paths
Security Architect
These experts protect a company’s computer systems by thinking like hackers and anticipating their tactics. They maintain system security, often working irregular hours to stay updated on the latest threats. Some of the best security architects may have a background as former hackers, as they understand how hackers operate.
Four (4) Cybersecurity Career Paths
Security Consultant
Security consultants act as advisors and supervisors, guiding companies on effective security measures. They assess potential security threats and develop plans for both prevention and response in case of breaches.
Four (4) Cybersecurity Career Paths
Ethical Hacker
(White Hat Hacker)
Ethical hackers are information security experts who legally and systematically attempt to break into computer systems, networks, or applications to uncover vulnerabilities. They do this with the owner’s permission to identify and fix security weaknesses before malicious hackers can exploit them.
Four (4) Cybersecurity Career Paths
Chief Information Security Officer (CISO)
The CISO is responsible for overseeing an organization’s information and data security. This role involves managing various aspects such as security operations, data protection, program management, and access control to ensure comprehensive protection of sensitive information.
Examples are security operations, data loss, program management, and access management.
Introduction to Risks, Threats, and Vulnerabilities
THE ANATOMY OF CYBERATTACK
Steps 1to 4
- Reconnaissance: Hackers gather info about the target, like IP addresses and emails. If needed, they trick employees with fake emails to find vulnerabilities.
- Attack: Once inside, they steal credentials to gain full access. Then they can steal data, encrypt it for ransom, or tamper with it.
- Expansion: They spread across the network, making it harder to detect. They don’t need high-level access anymore.
- Obfuscation: Hackers cover their tracks to confuse investigators. They use tricks like fake information, erasing logs, and hidden commands. This is the final step.
Seven (7) cybersecurity risks that may impact organizations
Technology
The widespread use of technology introduces vulnerabilities. For instance, if a company relies heavily on online customer data storage, a data breach could expose sensitive customer information.
Seven (7) cybersecurity risks that may impact organizations
Supply Chain
Organizations increasingly depend on third-party vendors and IoT devices. If a vendor’s systems are compromised, it could affect the organization. For example, a breach at a cloud service provider could impact multiple client companies.
Seven (7) cybersecurity risks that may impact organizations
Internet of Things (IoT)
IoT devices, like smart thermostats and security cameras, can be hacked if not properly secured. An example is a smart thermostat being hacked to disrupt a company’s HVAC system.
Seven (7) cybersecurity risks that may impact organizations
Business Operations
Increased connectivity can lead to more vulnerabilities. If a manufacturing plant relies on automated systems connected to the internet, a cyberattack could disrupt production.
Seven (7) cybersecurity risks that may impact organizations
Employees
Employees can unwittingly compromise cybersecurity. For instance, clicking on a phishing email link can lead to a malware infection that affects the entire organization’s network.
Seven (7) cybersecurity risks that may impact organizations
Regulatory
Governments introduce regulations to protect data. For instance, GDPR in Europe mandates strict data protection. Failing to comply can lead to hefty fines and damage an organization’s reputation.
Seven (7) cybersecurity risks that may impact organizations
Board of Directors
Boards play a crucial role in cybersecurity oversight. If they don’t prioritize cybersecurity, the organization may not be adequately prepared for cyber threats, which could lead to financial and legal consequences.
12 Cybersecurity Threats and Vulnerabilities
Ransomware
This is like digital kidnapping. Criminals use malicious software to lock your computer or files, and they demand money (a ransom) to unlock them. Paying the ransom doesn’t guarantee you’ll get your files back. For example, imagine someone locking your photos and asking for $500 to unlock them.