Module 1 Flashcards
What is the difference between data and information?
Data: Data is actually processed and is useless until organized (ex: each student’s test score)
Information: When data is processed and presented in a context that is useful (ex: Avg score of a class)
Information Security
Protection of information and information systems from unauthorized access in order to provide confidentiality, integrity, and availability
Computer Security
Measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by a computer
Cybersecurity
Prevention of damage to electronic communication systems to ensure availability, integrity, authentication, confidentiality
Describe the 3 States of Data
Data at Rest: Data that is preserved on a storage device
Data in transit/motion: Describes data that is transmitted over a network (ex information going over a network or internet)
Data in use: Data that is manipulated by a microprocessor (ex Microsoft Word Document editing)
CIA Triad
Refers to the 3 principles of security control and management, which is:
Confidentiality: Keeping info and communications private and protected
Integrity: Keeping organizational information accurate, free of errors, and free from unauthorized modification
Availability: Ensuring that computer systems operate continuously and that authorized persons can access the data they need.
As security is __________, convenience is ______________
Increased, Decreased
Hacker vs Threat Actor
Hacker: Programmer capable of developing programs and making coding changes to programs to make them more efficient.
Threat Actor: Hacker that uses their skill in a bad way. (Refers to gray and black hat hackers)
What is white vs black vs gray hat hackers
White Hat: Ethical hacker, exposes security flaws with organization’s consent to be fixed
Black Hat: Exposes security vulnerabilities without organizational consent for malicious purposes
Gray Hat: Exposes security flaws in applications without consent, but not for malicious purposes
What are the different types of threat actors? (hint 9)
- Script Kiddies: Inexperienced hackers with limited technical knowledge who rely on automated tools to hack Hacktivists: Hackers who rally and protest against different political and social ideas
-
Cybercriminals: Hackers who are either self-employed or working for larger cybercrime organizations
- Steal money
-
State Actors/State-Sponsored Hackers: Hackers who steal government secrets, gather intelligence, and sabotage networks of foreign governments, terrorist groups, and corporations
- Involved in attacks called advanced persistent threat (APT). (Try to stay as long as you can in a system, such as spying on a system)
-
Insiders: Present and past employees, contractors, partners, and any entity that has access to proprietary or confidential information and whose actions result in compromised security.
- Ex: Previous employee who had access to personal information
- Competitors: Launch an attack against an opponent’s system to steal classified information
- Criminal Syndicates: Moving from traditional criminal activities to more rewarding and less risky online attacks
- Shadow IT: Employees install their own equipment or resources in violation of company policies (can expose weaknesses in corporations)
- Brokers: Sell their knowledge of weakness to other attackers or governments
- Cyberterrorists: Attack a nation’s network and computer infrastructure to cause disruption and panic among citizens
Vulnerability
- State of being exposed to the possibility of being attacked or harmed
- A weakness in a system or its design that could be exploited
- Ex: A building that has unlocked doors or doesn’t have security cameras deployed
- Vulnerabilities can be categorized into platforms, configurations, third parties, patches, and zero-day vulnerabilities
Exploit
Taking advantage of the vulnerability or weakness
Attack
- Technique used to exploit a vulnerability in an application or physical computer system without the authorization to do so
- Ex: Physical security attacks, software based attacks, etc
List the 5 different categories that cybersecurity vulnerabilities can be categorized into:
- Platforms
- Configurations
- Third Parties
- Patches
- Zero-day vulnerabilities
Platform
- A system that consists of the hardware device and an OS that runs software
- Examples of platforms:
- Legacy Platforms: OS no longer in use
- On-premises platforms: physical software and technology in an enterprise (data center)
- Cloud Platforms: Pay per use computing model