Luck based studying Flashcards
HACKTIVIST:
Grey hat hackers who rally and protest different political and social ideas.
An example of a vulnerability database?
The National Common Vulnerabilities and Exposures (EVE) database.
Publicly available database of all known vulnerabilities.
An example of an early warning system?
Honeynet project creates a warning when someone accesses your data.
An example of a company that shares cyber intelligence?
InfraGard, partnership of the FBI and private sector
ISM Standards?
ISO/IEC 27000 standards are an example of Information Security Management standards.
What group tracks laws enacted to cyber security?
ISACA
Example of an attack that successfully destroyed infrastructure.
Stuxnet
What is scada used for?
Supervisory Control and Data Acquisition
used to control and monitor industrial processes.
BYOD?
Bring Your Own Device
Using a mobile device for company purposes.
What is IoT?
Internet of Things
The collection of technologies that enable the connection of various devices to the Internet.
What is an APT
Advanced Persistent Threat
Continuous computer hack that occurs under the radar against a specific object.
Algorithm attacks?
Can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
Federated identity?
A federated identity links a subject’s electronic identity across separate identity management systems. Exe, using google account ot log into Yahoo.
The most common way to protect federated identity is to tie login ability to an authorized
device.
TDoS
Telephone denial of service attack uses phone calls to tie up a system while not letting any calls get through.
National Institute of Standards and Technologies?
NIST
created a framework for companies and organizations in need of cybersecurity professionals
National Cybersecurity Workforce Framework
includes providing support, administration, and maintenance
Operate and Maintain
National Cybersecurity Workforce Framework
includes the identification, analysis, and mitigation of threats.
Protect and Defend
National Cybersecurity Workforce Framework
Examine cyber events and/or crimes of IT systems
Investigate
National Cybersecurity Workforce Framework
includes specialized denial and deception operations.
Collect and Operate
National Cybersecurity Workforce Framework
review and evaluation of incoming cybersecurity information.
Analyze
National Cybersecurity Workforce Framework
provides for leadership, management, and development
Oversight and Development
National Cybersecurity Workforce Framework
includes conceptualizing, designing, and building secure IT systems.
Securely Provision
DNS, HTTP. and online databases?
Prime targets for cybercriminals and packet sniffing.
Packet forgery?
also called interferes with an established network communication by constructing packets to appear as if they are part of a communication.
Internal security threats?
Improper handling of confidential information, abuse of administrator privileges, knowledge of security countermeasures.
External security threats?
Amaterur or skilled hackers, cna use vulnerabilities in netowkr devices, social engineering.
Impact of Big Data
Big data is the result of datasets that are large and complex, making traditional
data processing applications inadequate.
▪ ISACA Certified Information Security Manager (CISM)
– Cybersecurity specialists
responsible for managing, developing and overseeing information security systems at the enterprise level or for those developing best security practices can qualify for CISM.
The first dimension of the cybersecurity cube?
Identifies the goals to
protect the cyber world.
Confidentiality, integrity, and availability.
The second dimension of the cybersecurity cube?
protecting all of the states of data in the cyber world.
Data at rest or in storage, data in transit, data in process.
The third dimension of the cybersecurity cube?
defines the types of powers used to protect the cyber world.
Technologies- devices, and products available to protect information systems and fend off cyber criminals.
Policies and Practices -procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices
People - Aware and knowledgeable about their
world and the dangers that threaten their
world.
Confidentiality?
prevents the disclosure of information to unauthorized people, resources and processes. Another term for confidentiality is privacy.
Integrity?
▪ Integrity is the accuracy, consistency, and trustworthiness of data during its entire life
cycle.
Another term for integrity is quality.
Availability?
used to describe the need to maintain availability
of information systems and services at all times.
Methods for ensuring availability include system redundancy, system
backups, increased system resiliency, equipment maintenance, up-to-date
operating systems and software, and plans in place to recover quickly from
unforeseen disasters.
Accounting?
keeps track of what users do, including what they access, the amount of time
they access resources, and any changes made.