LO3 Flashcards

1
Q

What is identifying assets

A

There are two types of assets organisations identify which are called Physical assets and digital assets.

Digital assets are assets which are in the form of binary such as images, multimedia and textual content files.

Physical assets are hardware such as computers, printers, networking cabling, mice etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is identifying risk of assets

A

A risk is a threat of something that could happen, therefore organisations should identify risks in order to prepare for the eventuality of the risk for example conducting risk assessments

every single asset is at risk, risks for digital assets could be viruses, hacking and failure of protection from unauthorised users internally and externally

risks to physical assets can be damage, theft, malicious intent
Procedures can be put in place to prevent these risks such as anti viruses, locking rooms to protect physical assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List of testing and monitoring measures

A

Vulnerability testing

Intrusion detecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Vulnerability testing

A

identification of a list of vulnerabilities that can be prioritised and tested , the forms of vulnerability testing are penetration testing, Fuzzing, Sandboxing, security functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Talk about each form of vulnerability testing

A

Penetration testing- involves a skilled hacker or a team of hackers who you request for them to see if they can gain access to your system to understand what weaknesses the system has that needs to be fixed

Fuzzing- A method used to the security of the software for any unknown vulnerabilities such as security loop holes and coding errors it works by inputting large amounts of random data in attempt to make the system crash

Sandboxing- an isolated computer environment in which a program or file can be executed without affecting the application it runs on

security functionality- test used to identify flaw in security mechanism that are supposed to protect data and information and maintain functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Intrusion detection systems

A

device or software used to detect any malcious activity and the different forms of intrusion detection is Network intrustions detection system, Host intrusion system, Distributed intrusion system, Anomaly based intrusion system and signature based intrusion system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Talk about each form of intrusion detection system

A

Network intrusion detection system- Monitors all in bound and outbound network activity to identify any suspicious activity patterns which may indicate a cyber security attack

Host intrusion system- installed software such as firewalls, anti virus, anti spyware detection programmes that have two way access to the external environment such as internet access which monitors any suspicious activity

Distributed intrusion detection system- consist of multiple intrusion detection systems over a large network that communicate with each other to provide a broader view of the network’s activity as a whole and facilitates faster analysis of any issues

Anomaly based intrusion detection- Software designed to detect computer intrusions and misuse by monitoring the activity taking and classifies the activity as normal and as expected or if it is malicious activity however if the malicious activity falls under normal patterns it will not be detected

signature based intrusion detection- Mointors spefic patterns for network traffic or known instruction sequences used by malware it must be kept upto date to be effective with anti virus or anti spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

types of cyber security controls

A
Physical
hardware
Software
encryption
cryptography
procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Talk about physical cyber security controls

A

Limits access to buildings, rooms, and physical IT assets

examples
biometrics- using a persons physical characteristics for identification to allow access to the building and room
Locks- Prevents intruders from accessing rooms
Swipe cards- magnetic cards allowing authorised people access to buildings, rooms and IT equipment however can be lost or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Talk about hardware cyber security controls

A

Prevents the physical removal of items

Safe- Securely stores small items of equipment such as tablets, phones, removable storage drives

Cable locks- Used to secure items such as laptops and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Talk about software cyber security control

A

Software helps prevent unauthorised access to networks, computer systems and data

firewall- controls and monitors incoming and outgoing network traffic and decides on whether to allow or block the identified traffic

Anti malware- protects systems from malware and infection such as anti virsues and anti spyware

operating system updates- protects against cyber attack by removing and correcting vulnerabilities with the system that has been identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Talk about encryption cyber security control system

A

Encryption protects the confidentiality of digital data, while it is stored or transmitted using the internet or computer networks there are two types of encryption

asymmetric encryption- Uses two keys to encrypt plain text/ unencrypted information, anything encrypted by a public key can only be decrypted by a private key

Symmetric encryption- Only uses one key shared amongst people who need access to the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Talk about cryptography

A

Protects information and resources on open and closed networks and allows only the sender and intended recipient to view information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Talk about procedures in cyber security controls

A

There are different procedures in cyber security controls

access management- Process of managing access to a computer system or network by allowing authorised users and prevent unauthorised access

Data Backup- Process of copying or achieving data, including files and folders, so that they can be restored if the data is lost from the system

Remote working- Asessing the risks involved with remote working can include

  • the type of information and services that can be accessed or stored on devices
  • devices security configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Data at rest, data in transit and data in cloud

A

Data at rest- Means data is at rest stored in a hard drive and is fairly secure as it protected by defences such as firewall, and anti malware programs

Data in transit- • Data is at its most vulnerable when it is in motion, and protecting information in this state requires specialized defences.
• When you send an email, anyone with the right tools can intercept your email as it moves along its path through the electronic infrastructure best way to make it more secure is through encrypted platforms

data in the cloud- data stored on servers made my big trustowrhty companies such as google and the data is accessible to via the internet, ways to keep the data secure is by regularly updating your passwords and include numbers and symbols making it harder to guess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly