Introduction to Cybersecurity Tools and Cyber Attacks Week One Flashcards
Jeff Crume described five challenges in security today. Which three of these are challenges because their numbers are increasing rapidly?
Alerts, Needed Knowledge, Threats
About how many unfilled cybersecurity jobs are expected by the year 2022?
1.8 million
What is the National Institute of Standards’ (NIST) definition of cybersecurity?
The protection of information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
Which three are components of the CIA Triad?
Confidentiality, Availability, and Integrity
‘A flaw, loophole, oversight, or error that can be exploited to violate system security policy’ is the definition of which key cybersecurity term?
Vulnerability
‘An event, natural or man-made, able to cause a negative impact to an organization’ is the definition of which key cybersecurity term?
Threat
Most cyber attacks come from which one of the following sources?
Internal factors, such as current and former employees.
Question 6
Vulnerabilities are weaknesses in a system that can be exploited. Which are the two most common ways in which vulnerabilities are introduced to a system?
Many vulnerabilities occur as a result of misconfiguration by the system administraton
AND
Many systems are shipped with known and unknown security holes, such as insecure default settings.
Which security role would be responsible for conducting information security assessments for organizations, including analyzing events, alerts and alarms?
Information Security Analyst
Which American president first recognized the need for a national policy on cybersecurity?
Ronald Regan
In addition to specific events, what other factor has led to an enhanced need for strong cybersecurity?
Computing devices like PCs and smartphones are now used by a large majority of people
Between 2010 and 2016 the number of new software vulnerabilities discovered during this 7-year period was in what range?
7000 to 10,000
An example of weaponizing a cyber vulnerability is the use of the Stuxnet virus. Which attack by a government actor successfully used this virus?
Stuxnet was used to disable uranium processing equipment in an Iranian nuclear facility
Which three factors make cybersecurity far more difficult now than it was in the past when you only needed to protect the computer?
Multiple different vendors, each supporting different technology and protocols
Mobile technology - everyone has a smartphone
Data protection - your data is everywhere
Which aspect of a comprehensive approach to cybersecurity includes these items: classification, implementation steps, asset control and documentation?
Asset Management
Which aspect of a comprehensive approach to cybersecurity includes these items: policies, procedures, standards, user education, incident response, disaster recovery, compliance and physical security?
Administrative Controls