Lecture 1 Cybersecurity and crime Flashcards

1
Q

C,I,A

A

Confidentiallity = only authorized party can access the information

Integrity = info/resource in correct state and complete

Availability = info/resource is available for use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Different parts of a system

A

Operating system
The network
The Application
Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zawinskis law

A

“Every program attempts to expand until it can read mail. Those programs which cannot so expand are replaced by ones which can.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

second system effect

A

“When one is designing the successor to a relatively small, elegant, and successful system, there is a tendency to become grandiose in one’s success and design an elephantine feature-laden monstrosity.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

building bloat ware

A

1-we have a problem
2-software built to fix issue
3-requirements change to fix a new problem
4-old code is refused to help fix something else
5- new company takes over and integrates their stuff
6- done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how legacy comes to be

A

1- develop a tool
2- build on top of it
3- do nothing and wait until environment changes (innovation)
4- done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

incentives classic approach

A
  • most businesses want to optimize time to market
  • start ups want to test ideas
  • software developers are rewarded for new features, change and as fast as possible
  • system administrators are rewarded for a stable system, being conservative and maintaining availability
  • this incentive structure entails friction and tension by design
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

project management triangle

A

quality provided by
scope
cost
time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threats (types of malware)

A
virus
trojan
spyware
adware
worms
rootkit
remote access trojan
polymorphism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

social engineering

A

the impersonation of someone else in order to get someone or to get privileged information

eg; phishing = mass targeted social engineering attack

spear phishing = targeted social eng attack

CEO fraud - soc eng attack trying to get someone to do something by pretending to be CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Botnet + DDOS

A

botnet is a network of infected computers which can be controlled by some actor. (used for ddos attacks). distributed denial of service used to exhaust the resources of the target, making it unavailable for service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ransomeware

A

type of malware infection which denies access to a computer until a ransome is paid

eg cryptoblockers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

nation state actors

A

motives = cause chaos, undermine other countries

capability = extended resources and persuation

methods= advanced well planned attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

insider threats

A

Who- employees (mostly)
Motives- unintentional by mistake, money, revenge, espionage
Capability - substantial damage depending on role in organisation
Methods- give out sensitive corporate data, sabotage systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hacktivists

A

Who- online groups like anonymous
Motives- reactionary (act when upset)
Capability- alot of time and resources at their disposal
Methods- DDOS, persistent online hate mobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

organized crime

A

WHO- test
Motive- maximise income
capability- Depending on target but can be substantial
Methods- use path of least resistance, ROI is important

17
Q

for fun hackers

A

who- for fun hackers, script kids
motives- fun and bragging rights
capability - often very limited
methods- DDOS common but anything goes