Laws And Lists Flashcards

1
Q

Morovec’s Paradox

A

AI can compete high level reasoning with little effort but simple tasks (walking) require enormous computational resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4th industrial revolution

A

Digital tech interacting with biology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 laws of robotics

A

1) robot may not injure human
2) robot must obey orders
3) robot must protect itself as long as 1 and 2 are not broken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Boston dynamics

A

Robots move more like animals than humans to reduce paradox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Moore’s law

A

Digital computing power double every 2 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 Ts (risk)

A

Tolerate, Treat, Transfer, Terminate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk mgt principles (Hopkins)

A

1) framework and processes should be customized and proportionate
2) appropriate and timely involvement of stakeholders
3) structured and comprehensive approach
4) RM is part of all org activities
5) RM anticipates, detects, acknowledges and responds to change
6) RM explicitly considers any limitations of available info
7) human culture factors influence all aspects of RM
8) RM is continually improved through learning and experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evan’s 5 digital business models

A

1) Digitizing products & services (Netflix)
2) Running or participating in digital platforms (Amazon)
3) Tapping into sharing economy/crowd sourcing (Tesla)
4) Reshaping Value Networks (Uber, Airbnb)
5) New models of monetization- free network (Facebook)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk of Digital Business

A

Customer satisfaction rating are public and can cause a loss of business. Bad web design, payment hacking, badly written electronic communications, fraud due to online anonymity. (TSB Bank)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hopkin’s 4 kind of digital risks

A

1) Compliance risks (regulations)
2) Hazard risks (hacking, denial of service attacks)
3) Control risks (software bugs)
4) Opportunity risks (risk taken to gain return)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

6 Cyber Defense Points

A

1) Data
2) Devices
3) Applications
4) Systems
5) Networks
6) Other communication channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 categories of cyber security control

A

1) physical
2) technical
3) procedural
4) legal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

5 Steps - Cyber Security Framework
steps 1-2 are proactive
steps 3-5 are reactive

A

1) Identify (asset value)
2) Protect (with security)
3) Detect (any compromised account or device)
4) Respond (quarantine the problem)
5) Recover (replace and fix compromised data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

5 Types of Insider Information

A

1) unauthorized disclosure of data
2) process corruption
3) facilitation of 3rd party access
4) physical sabotage
5) electronic/it sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 dimensions of value classification

A

1) confidentiality
2) integrity
3) availability
and sometimes consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3 modes of cyber security control

A

1) preventative
2) detective
3) corrective

17
Q

Lifecycle of a Malware Attack

A

1) Reconnaissance
2) Tooling/Preparation
2) Infection
4) Persistence
5) Connection
6) Control
7) Realizing the value

18
Q

Cyber Essentials

A

1) Firewall
2) Secure device settings
3) Control access
4) Protect from viruses
5) Keep devices up to date

19
Q

14 Point Framework of Cyber Defense - key point

A

Management/Board Support

20
Q

3 levels of coordinating an overall security position

A

1) governance - policies/procedures
2) compliance - verification of governance
3) risk - anything that can have a substantial impact

21
Q

8 Groups of Threat Actors

A

1) Nation States (intelligence)
2) Terrorist Groups (Money, profile)
3) Organized Crime (money)
4) Hacktivist Communities (greater good)
5) Skilled Professional Hackers (assassins’ for hire)
6) Disaffected or Opportunistic Insiders (rouge employee)
7) Armature Hacker (for them
8) Anyone

75% of attacks are from insiders

22
Q

5 ways of treating risk

A

1) prevention
2) reduction
3) acceptance
4) contingency
5) transfer

23
Q

Security Incident Lifecycle

A

1) Detection and Reporting
2) Verification
3) Isolation (quarantine)
4) Cleaning
5) Review

(Detect, Respond, Recover)

24
Q

US Cert - 6 Categories of a security incident

A

1) Unauthorized Access
2) Denial of Service
3) Malicious Code (Malware)
4) Improper Usage
5) Attempted Intrusion
6) Investigation

25
Q

Change Management Process

A

1) Formally request a change
2) Categorize and prioritize change
3) Analyze and justify change
4) Approve and schedule change
5) Plan and complete implementation
6) Post implementation review

26
Q

10 Guiding Principles of Change

A

1) Address the human side of change systematically
2) Change starts at the top and begins on day 1
3) Real change happens at the bottom
4) Confront reality, demonstrate faith
5) Create ownership not just buy in
6) Practice targeted over-communication
7) Explicitly address culture
8) Assess the cultural landscape early
9) Prepare for the unexpected
10) Speak to the individual as well as the institution