Intro to Cybersecurity Chapter 1 Flashcards

1
Q

What is Cybersecurity?

A

The ongoing effort to protect these networked systems and all of the data from unauthorized use or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cybersecurity in the personal realm?

A

The need to safeguard your identity, your data, and your computing devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cybersecurity at the corporate level?

A

It is everyone’s responsibility to protect the organization’s reputation, data, and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Cybersecurity at the state level?

A

The national security, and the safety and well-being of the citizens are at stake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is your offline identity?

A

It is the person who your friends and family interact with on a daily basis at home, at school, or work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is your online identity?

A

Online identity is who you are in cyberspace, how you present yourself to others online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What 7 aspects of personal data?

A
  1. Data on computing devices
  2. Medical Data
  3. Employment
  4. Information online
  5. Your identity
  6. Education Data
  7. Financial Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is personal data?

A

Personal information can uniquely identify you as an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What areas encompass personal data?

A

Pictures, messages, name, ocial security number, date and place of birth, and mother‘s maiden name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are personal medical records?

A

electronic health records (EHRs) and fitness bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are are education records?

A

Information about your grades and test scores, your attendance, courses taken, awards and degrees rewarded, and any disciplinary reports. (This record may also include contact information, health and immunization records, and special education records including individualized education programs (IEPs).)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Employment and Financial Records

A

Information about your income and expenditures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of organization data?

A

Traditional Data and Internet of Things and Big data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does corporate traditional data comprise of?

A

Personnel information, intellectual properties, and financial data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does IoT data comprise of?

A

IoT is a large network of physical objects, such as sensors and equipment that extend beyond the traditional computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the CIA triad?

A

Confidentiality, Integrity, Availability

17
Q

Define confidentiality.

A

Another term for confidentiality would be privacy. Policies should restrict access to the information to authorized personnel and ensure that only those authorized individuals view this data.

18
Q

Define Integrity.

A

Integrity is accuracy, consistency, and trustworthiness of the data during its entire life cycle.

19
Q

What are some Hash/Checksums?

A

MD5, SHA-1, SHA-256, and SHA-512.

20
Q

Why are hash/checksums used?

A

A checksum is used to verify the integrity of files, or strings of characters, after they have been transferred from one device to another across your local network or the Internet.

21
Q

What is availability?

A

Maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups ensure the availability of the network and data to the authorized users.

22
Q

What are the consequences of a Security Breach?

A
  1. Ruined Reputation
  2. Vandalism
  3. Theft
  4. Revenue Lost
    Damaged Intellectual Property
23
Q

What are three broad categories of hackers?

A

White, Grey, and Black

24
Q

What are White Hat Hackers?

A

These are ethical hackers who use their programming skills for good, ethical, and legal purposes.

25
Q

What are Grey Hat Hackers?

A

These are individuals who commit crimes and do arguably unethical things, but not for personal gain or to cause damage.

26
Q

What are Black Hat Hackers?

A

These are unethical criminals who violate computer and network security for personal gain, or for malicious reasons such as attacking networks.

27
Q

What are three types of Attackers?

A

Amateures, Hackers, Organized Hackers

28
Q

What are two types of cyber attacks?

A

Internal and External

29
Q

What are the Internal Cyber attacks?

A

Employee, ex-employee, Contract Staff, and Trusted partners

30
Q

What are external Cyber attacks (outsiders)?

A

Organized Attackers, Hackers, Amateures

31
Q

What are three categories of legal issues?

A

Personal Legal Issues, Corporate Legal Issues, International Law and Cybersecurity

32
Q

What is the global cyber partnership that outlines international Law on Cybersecurity?

A

International Multilateral Partnership Against Cyber Threats (IMPACT)

33
Q

What are personal ethical issues?

A

Would I want to discover that someone has hacked into my computer and altered images in my social network sites?

Would I want to discover that an IT technician whom I trusted to fix my network, told colleagues personal information about me that was gained while working on my network?

34
Q

What is Cyberwarfare?

A

Cyberwarfare is an Internet-based conflict that involves the penetration of computer systems and networks of other nations.

35
Q

What is the purpose of cyberwarfare?

A

The main purpose of cyberwarfare is to gain advantage over adversaries, whether they are nations or competitors.