IT Security Flashcards

1
Q

What was Stuxnet?

A

a sophistocated worm that disables IRans nuke program for a while and also opened up a new threat for cyberwarfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the Goals of an Information Security Program

A

CIA Model. Confidentiality(keeping sensitive info out of the wrong hands) Integrity (Protect form intentional or accidental modification) Availability(accessible when needed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 components of the Info Security Model

A

Information States, Information Security Properties, Security MEasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 info security properties

A

CIA again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 information states

A

processing storage transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the 3 types of Security Measures

A

Policy &Procedures, Technology, Education & Training & Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the motivations of cyber criminals? (x8).

A

account transfers, stealing personal and financial data, corporate espionage, cyberwarfare, terrorism, pranks, Hacktivism, revenge. All the same people find data cutting edge cannot take pranks real hard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where do most threats come from

A

insiders and unknown causes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Phishing?

A

cons executed through technology achieved by leveraging the reputation of trusted firm or friend to trick a victim into revealing info or doing something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do bot-herders do?

A

install malware onto computers and either execute an attack or sell the “Zero Day” capability on the black market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is social engineering?

A

con games trick employees into revealing information or other compromising tasks. Methods include baiting someone to give up info that can help the attacker. uses harassment, guilt or intimidation especially on social media ex: the models buddying up with IT staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is shoulder surfing

A

looking over someone’s shoulder to see their password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is unique about this part of IT?

A

It almost never increases profits, thankless job, mess up once and youre screwed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Qualitative Risk Analysis

A

probability X Severity = Exposure. Take care of high exposure first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 4 possible responses to risk?

A

Accept it, Transfer it, Mitigate it, Avoid It

How well did you know this?
1
Not at all
2
3
4
5
Perfectly