Lecture 1 - Introduction Flashcards
What is the Milennium Bug?
An example of a classic cybersecurity issue is the millenium bug. These were coding errors that people assumed would happen at the turn of the millenium. Luckily, this didn’t turn out to be a problem. But did it turn out this way because organisations actually did something about it or was the risk overhyped?
What happened at Cambridge Analytica?
Cambridge Analytica is an organization that profiled and characterized individuals in order to show them specific ads.
What happened with Strava?
Strava lets you track your running and riding with GPS. To show how much people used their software, the company uploaded a map with all the locations where Strava was used, accidentally exposing a secret US military base.
What happened at the OPCW?
The OPCW (Organisation for Prohibition of Chemical Weapons) was victim of a hacking attempt, involving on site infiltration. Russia was accused of this cyberattack on the chemical weapons watchdog.
What happened at diginotar?
Diginotar is a company that gives out certificates for confirmed authentic websites, but because of lack of security they were hacked and were consequently not trusted anymore.
What happened at Maastricht University
Maastricht University was attacked with ransomware and was eventually forced to pay the ransom money.
What is Stuxnet?
Stuxnet is a worm created for the specific purpose of harming the systems of a nuclear power reactor in Iran. It spread to other systems, but as it was designed only to harm the reactor systems, it did no damage to others
What happened at Schiphol?
Schiphol airport had a bug in the fuelling system, so workers weren’t able to refuel the planes properly, resulting in extensive delays. (oopsie) Sometimes it is easier to say its a cyberattack instead of a bug, as to avoid admitting incompentency. However, sometimes it is easier to do it the other way around as well. Saying something was a bug instead of a cyberattack could result in less consequences.
What happened to Dutch Banks?
Dutch banks were targeted by heavy some time. DDoS attacks and their websites were down for These attacks disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
How to do Data-backup properly?
You can back up data according to the 3-2-1 method; 3 copies of your data, 2 are local and 1 is further away like in the form of external harddisks or external harddrives. Using this method will make sure that there is no single point of failure.
Why do we care about Cybersecurity?
- Protection of critical national infrastructure
- Privacy and sensitive data
- Financial reasons
How is cybersecurity illustrated in the three-layer onion model.
The inner core consists of three-layer model: technical solutions to make cyberspace safe.
The middle layer is socio-technical, as it is where the people come in. Meaning how the people work with the technical systems.
The outer layer is the governance layer, consisting of how society deals with cybersecurity issues on a political, legal and public administration level.
What is the CIA-Triad?
Confidentiality The protected information is only available to authorised entities. Confidentiality can not only be breached through hacking, but also through accidental wrong attachments in an email or materials not removed or disposed of correctly.
Integrity It is certain that the data is true with no unauthorised undetected changes made to the data. Integrity is breached through: Deleting data Changing data Adding data
Data is available when needed and people who should have access, do have access.
What does CIA-Confidentiality entail?
a. The assignment of a value to a set of information to indicate the level of secrecy and the access restrictions required to prevent unauthorized people from viewing it. A typical example of a confidentiality scale is: (i) Public Use (ii) Internal Use (iii) Confidential (iv) Strictly Confidential and (v) Restricted.
What does CIA-Integrity
entail?
a. A value that can be assigned to a set of information to indicate how sensitive it is to degradation of accuracy (such as unauthorized modification) or data loss. Loss in this context is about losing information without the ability for anyone to recover it from the system it was entered into (it is not about theft). Often this value is expressed or translated into a scale of time. For example, data with the highest possible integrity rating could be given a value of ‘no data loss permitted.’ If it were permitted to lose up to 4 hours of data that had been processed, the value would be ‘4 hours.’ Usually, if any data loss is permitted, it means that there will be other processes in place to address the loss of the electronic information. The integrity value assigned to any system or application is used to set the frequency that the information is subject to backup, or in very sensitive systems with no data loss permitted, establishes the need for a permanent secondary failover system.
What does CIA-Availability entail?
a. The assignment of a value to a set of information to indicate how much disruption or outage the owner considers to be acceptable. Often this is expressed or translated into a scale of time. Data with the highest possible availability rating would be required to be readily accessible at all times (no downtime permitted), often through the use of a fully redundant failsafe. The value assigned to the information’s availability is used by the owner of an application or service to set the recovery time objective.
What is Cybersecurity?
Cybersecurity is the protection of digital devices and their communication channels to keep them stable, dependable and reasonably safe from danger or threat. Usually the required protection level must be sufficient to prevent or address unauthorized access or intervention before it can lead to substantial personal, professional, organizational, financial and/or political harm
What is a Digital Device?
A Digital Device is any electronic appliance that can create, modify, archive, retrieve or transmit information in an electronic format. Desktop computers, laptops, tablets, smartphones and Internet-connected home devices are all examples of digital devices
What is Defense in Depth?
Defense in depth is the use of multiple layers of security techniques to help reduce the chance of a successful attack. The idea is that if one security technique fails or is bypassed, there are others that should address the attack. The latest (and correct) thinking on defense in depth is that security techniques must also consider people and operations (for example processes) factors and not just technology.
What is a Virus
Virus is a form of malicious software that spreads by infecting (attaching itself) to other files and usually seeks opportunities to continue that pattern. Viruses are now less common than other forms of malware. Viruses were the main type of malware in very early computing. For that reason, people often refer to something as a virus when it is technically another form of malware.
What is the Darwin Effect in Cyberspace
Darwin effect in cyberspace is that those who adapted to the advantages of connected technologies were (and are) gaining advantages and thriving. Those organizations that were (and are) not evolving to use connected technologies are mostly shrinking or perishing.
What is Cryptoanalysis?
Cryptoanalysis is the art of examining ciphered information to determine how to circumvent the technique that was used to encode or hide it. In other words; analyzing ciphers (coded messages).
What is the Cloud?
The Cloud = An umbrella term used to identify any technology service that uses software and equipment not physically managed or owned by the person or organization (customer) using it. This usually provides the advantage of on-demand scalability at lower cost. Examples include applications that are hosted online, online file storage areas, and even remote virtual computers. Using a cloud means the equipment managing the service is run by the cloud provider and not by the customer. But although the customer does not own the service, he or she is still accountable for the information that he or she chooses to store and process through it. Usually a cloud service is identified by an ‘aaS’ suffix. For example – SaaS (Software as a Service), IaaS (Infrastructure as a Service) and PaaS (Platform as a Service).
What is a Vulnerability?
Vulnerability = a weakness, usually in design, implementation or operation of software (including operating systems), that could be compromised and result in damage or harm.
What is an Attack Vector?
In the cybersecurity world, any potential vulnerability that might be leveraged is called an attack vector.
What is the bleeding edge?
Bleeding edge is Using inventions so new, they have the likelihood to cause damage to their population before they become stable and safe.