Intro to Cybersecurity Chapter 1 Flashcards
What is Cybersecurity?
The ongoing effort to protect these networked systems and all of the data from unauthorized use or harm
What is Cybersecurity in the personal realm?
The need to safeguard your identity, your data, and your computing devices.
What is Cybersecurity at the corporate level?
It is everyone’s responsibility to protect the organization’s reputation, data, and customers
What is Cybersecurity at the state level?
The national security, and the safety and well-being of the citizens are at stake.
What is your offline identity?
It is the person who your friends and family interact with on a daily basis at home, at school, or work.
What is your online identity?
Online identity is who you are in cyberspace, how you present yourself to others online
What 7 aspects of personal data?
- Data on computing devices
- Medical Data
- Employment
- Information online
- Your identity
- Education Data
- Financial Data
What is personal data?
Personal information can uniquely identify you as an individual.
What areas encompass personal data?
Pictures, messages, name, ocial security number, date and place of birth, and mother‘s maiden name.
What are personal medical records?
electronic health records (EHRs) and fitness bands
What are are education records?
Information about your grades and test scores, your attendance, courses taken, awards and degrees rewarded, and any disciplinary reports. (This record may also include contact information, health and immunization records, and special education records including individualized education programs (IEPs).)
What are Employment and Financial Records
Information about your income and expenditures.
What are the two types of organization data?
Traditional Data and Internet of Things and Big data.
What does corporate traditional data comprise of?
Personnel information, intellectual properties, and financial data.
What does IoT data comprise of?
IoT is a large network of physical objects, such as sensors and equipment that extend beyond the traditional computer network.
What is the CIA triad?
Confidentiality, Integrity, Availability
Define confidentiality.
Another term for confidentiality would be privacy. Policies should restrict access to the information to authorized personnel and ensure that only those authorized individuals view this data.
Define Integrity.
Integrity is accuracy, consistency, and trustworthiness of the data during its entire life cycle.
What are some Hash/Checksums?
MD5, SHA-1, SHA-256, and SHA-512.
Why are hash/checksums used?
A checksum is used to verify the integrity of files, or strings of characters, after they have been transferred from one device to another across your local network or the Internet.
What is availability?
Maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups ensure the availability of the network and data to the authorized users.
What are the consequences of a Security Breach?
- Ruined Reputation
- Vandalism
- Theft
- Revenue Lost
Damaged Intellectual Property
What are three broad categories of hackers?
White, Grey, and Black
What are White Hat Hackers?
These are ethical hackers who use their programming skills for good, ethical, and legal purposes.
What are Grey Hat Hackers?
These are individuals who commit crimes and do arguably unethical things, but not for personal gain or to cause damage.
What are Black Hat Hackers?
These are unethical criminals who violate computer and network security for personal gain, or for malicious reasons such as attacking networks.
What are three types of Attackers?
Amateures, Hackers, Organized Hackers
What are two types of cyber attacks?
Internal and External
What are the Internal Cyber attacks?
Employee, ex-employee, Contract Staff, and Trusted partners
What are external Cyber attacks (outsiders)?
Organized Attackers, Hackers, Amateures
What are three categories of legal issues?
Personal Legal Issues, Corporate Legal Issues, International Law and Cybersecurity
What is the global cyber partnership that outlines international Law on Cybersecurity?
International Multilateral Partnership Against Cyber Threats (IMPACT)
What are personal ethical issues?
Would I want to discover that someone has hacked into my computer and altered images in my social network sites?
Would I want to discover that an IT technician whom I trusted to fix my network, told colleagues personal information about me that was gained while working on my network?
What is Cyberwarfare?
Cyberwarfare is an Internet-based conflict that involves the penetration of computer systems and networks of other nations.
What is the purpose of cyberwarfare?
The main purpose of cyberwarfare is to gain advantage over adversaries, whether they are nations or competitors.