ITSAC - Module 3 & 4 Flashcards

1
Q

Refers to the practice of protecting digital devices, systems, and networks from unauthorized access, theft, damage, or other malicious activities.
It includes various methods and technologies that are used to safeguard information, such as firewalls, encryption, authentication, and intrusion detection systems.

A

Cyber Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious software designed to harm, exploit, or disrupt devices, networks, or data. Examples include viruses, ransomware, and spyware.

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A cyber attack where attackers impersonate legitimate entities (e.g., banks, companies) to trick users into providing sensitive information like passwords or credit card details.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A targeted form of phishing where attackers customize messages to a specific individual or organization to gain access to confidential data.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack where a hacker intercepts and alters communication between two parties without their knowledge, often to steal sensitive information.

A

Man-in-the-middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack that overwhelms a system, network, or website with excessive traffic, causing it to slow down or crash, making services unavailable.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A cyber attack that exploits vulnerabilitiesin a website’s database by injecting malicious SQL code to gain unauthorized access to sensitive data.

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of cyber attack that manipulates the Domain Name System (DNS) to redirect users to fraudulent websites or disrupt network services.

A

DNS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is constantly evolving and changing as new threats and vulnerabilities emerge. In recent years, there has been a significant increase in cyber attacks, data breaches, and other cyber threats, which has led to a heightened focus on cyber security.

A

Cyber Security Landscape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the most prevalent emerging business risk

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

THE ANATOMY OF RANSOMWARE

A
  1. Reconnaissance - gathering and analyzing infos to select vulnerabiities to enter the org
  2. Delivery - gaining access to org’s networks and data (phishing, SQL inject, web)
  3. Exploitation - installing backdoors, exploiting alternative vulnerabilities, and exfiltrating or destroying data
  4. Impact - demand for ransom and operational capabilities after recovery efforts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

– refers to adhering to laws, Regulations, and industry standards that govern the use and protection of digital data

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Developing and implementing strategies to prevent, detect, respond, and recover from cyber attacks
  • requires testing and updating security measures regularly to adapt to new threats and vulnerabilities
A

Resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

THE NIST CYBERSECURITY FRAMEWORK

A
  1. Identify - what procecesses and assets need protection?
  2. Protect - implement appropriate safeguards to ensure protection of the enterprise’s assets
  3. Detect - implement approriate mechanisms to identify the occurence of cybersecurity incidents
  4. Respond - develop techniques to contain the impacts of cybersecurity events
  5. Recover - implement the appropriate proccesses to restore capabilities and services impaired due to cybersecurity events
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • high-level overview or the org
  • long term plan (5+ years)
  • forward looking
  • each level of division translates plan objectives into more specific objectives
  • executive team (CEO, COO, CFO, CIO)
A

Strategic Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • methods used to achieve the strategy
  • short term plan (1-2 year or less)
  • includes specific goals, budget, resources
  • breaks down strategil goals
  • eg. project plans, resource acquisition, project budgets, project reviews
  • Chief Information Security Officer (CISO) and security managers
A

Tactical Planning

17
Q
  • plan day to day running
  • controlled via daily/weekly/monthly/annual
  • inclued necessary tasks for all departments, communication, and reporting requirements
A

Operational Planning

18
Q

High-level statements which define roles, responsibilities, and expectations for specific domain areas.
- general
- what to do & not to do in org
- “all company data should be protected from unauthorized access”

19
Q

Specific low-level, mandatory controls that help enforce and support policies.
- how to comply to a certain policy

20
Q

Recommended controls that help support standards or serve as a reference for when no applicable standard is available.
- not mandatory
- “use password manager”

A

Guidelines

21
Q

Step-by-step instructions to accomplish policies, standards, and guidelines.
- specific
- how to change password

A

Procedures

22
Q
  • isa management-level document, often written by the company’s CIO, detailing the company’s philosophy on security.
  • general policy to a whole
A

1. Enterprise information security policies

23
Q

– is developed by an organization to outline the guidelines that govern the use of individual technologies in that organization.
- specific

A

2. Issue-specific security policies (ISSP)

24
Q
  • focus on the information security policies of particular systems. For example, policies for customer-facing applications, payroll systems, or data archive systems.
  • identtify security needed
A

3. Systems-specific security policies

25
Q

: An Introduction to Computer Security: The NIST Handbook​

26
Q

: Generally Accepted Principles and Practices for Securing Information Technology Systems​

27
Q

: Guide for Developing Security Plans for Federal Information Systems​

A

SP 800-18 Rev. 1

28
Q

: Guide for Conducting Risk Assessments​

A

SP 800-30 Rev. 1

29
Q

: Guide for Applying the Risk Management Framework to Federal Information Systems: ASecurity Life Cycle Approach​

A

SP 800-37 Rev. 1

30
Q

: Managing Information Security Risk: Organization, Mission, and Information System View​

31
Q

: Building an Information Technology Security Awareness and Training Program​

32
Q

: Performance Measurement Guide for Information Security​

A

SP 800-55 Rev. 1

33
Q

: Information Security Handbook: A Guide for Managers​

A

SP 800-100