Module 1 - Analyzing the Cyber Security Environment Flashcards
What is Cybersecurity?
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm.
What is Personal Level Cybersecurity?
Personal cybersecurity involves the techniques and best practices used to protect your privacy, data, and devices from unauthorized access and malicious cyberattacks.
What is Organizational Level Cybersecurity?
Organizational level cybersecurity is the implementation of cybersecurity policies, processes, and technologies to protect an organization’s data, systems, and networks from cyber threats. At an organizational level, it is everyone’s responsibility to protect the organization’s reputation, data and customers.
What is Government Level Cybersecurity?
Government-level cybersecurity refers to the practices and technologies that governments use to protect their critical infrastructure, sensitive data, and citizens from cyber threats.
What is Identity-based Security?
Identity-based security is a type of security that focuses on access to digital information or services based on the authenticated identity of an entity. It ensures that the users and services of these digital resources are entitled to what they receive. The most common form of identity-based security involves the login of an account with a username and password. However, recent technology has evolved into fingerprinting or facial recognition.
What is Identity Theft?
Identity theft, identity piracy or identity infringement occurs when someone uses another’s personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
What is Traditional Data?
Traditional data is structured data that has been collected and stored in formats like databases, spreadsheets, etc. It is organized in a predefined manner, such as tables, columns, and rows. Traditional data is typically easy to manipulate and can be managed with conventional data processing software.
What is Transactional Data?
Transactional data is data that is generated by business transactions. It is the data that is captured when a customer buys a product or service, when a supplier delivers goods, or when an employee completes a task. Transactional data is typically stored in databases and is used to track business performance, manage inventory, and make informed decisions.
What is Intellectual Property?
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. It includes inventions, literary and artistic works, designs, and symbols, names and images used in commerce. IP is protected by law through patents, copyrights, trademarks, and trade secrets.
What is Financial Data?
Financial data is quantitative information about the financial performance and health of a company or other organization. Financial data include: statement of financial position, statement of comprehensive income, statement of changes in equity, and statement of cash flows.
What is Cyberwarfare?
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic warfare.
What is Compromised Information?
Compromised information is any sensitive information that has been accessed, used, or disclosed without authorization. This can include personal information, financial information, intellectual property, and trade secrets.
What are Defense Secrets?
Defense secrets are classified information related to national security and defense capabilities. They can include information about military plans, operations, weapons systems, and intelligence gathering. Defense secrets are typically classified by governments and militaries to protect them from falling into the hands of adversaries.
What is Stuxnet?
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran.
What is Information Security?
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information.
What is CIA Triad?
Information security’s primary focus is the balanced protection of data confidentiality, integrity, and availability (also known as the “CIA” triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity.
What is Confidentiality in CIA Triad?
Confidentiality in the CIA Triad is the principle that information should only be accessible to authorized individuals. This means that unauthorized individuals should not be able to read, modify, or destroy information.
What is Integrity in CIA Triad?
Integrity in the CIA Triad is the principle that information should be accurate and complete, and has not been tampered with. This means that unauthorized individuals should not be able to modify or destroy information without authorization.
What is Availability in CIA Triad?
Availability in the CIA Triad is the principle that information and systems should be accessible to authorized users when they need them. This means that systems should be up and running, and data should be accessible.
What is DAD Triad?
The DAD Triad is a complementary model to the CIA Triad. While the CIA Triad focuses on the goals of confidentiality, integrity, and availability, the DAD Triad focuses on the risks that can prevent these goals from being achieved.
What is Disclosure in DAD Triad?
Disclosure is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss. It is a violation of the principle of confidentiality.
What is Alteration in DAD Triad?
Alteration is the unauthorized modification of information and is a violation of the principle of integrity.
What is Destruction in DAD Triad?
Denial is the unintended disruption of an authorized user’s legitimate access to information. Denial events violate the principle of availability.
What are Security Controls?
Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. n the field of information security, such controls protect the confidentiality, integrity and availability of information.
What are Physical Security Controls?
Physical controls are anything that physically limits or prevents access to IT systems. Fences, guards, dogs, and CCTV systems and the like.
What are Procedural/Administrative/Managerial Security Controls?
Procedural/Administrative/Managerial controls are organization’s policies and procedures. Their purpose is to ensure that there is proper guidance available in regard to security and that regulations are met. They include things such as hiring practices, data handling procedures, and security requirements.
What are Technical/Logical Security Controls?
Technical/Logical controls are hardware or software whose purpose is to protect systems and resources. Examples of technical controls would be disk encryption, File integrity software, and authentication. Hardware technical controls differ from physical controls in that they prevent access to the contents of a system, but not the physical systems themselves.
What are Operations Security Controls?
Operational controls include the processes that we put in place to manage technology in a secure manner. These include user access reviews, log monitoring, and vulnerability management.
What are Legal/Regulatory Security Compliance Controls?
Legal/Regulatory security compliance controls are measures that organizations implement to meet their obligations under applicable laws and regulations. These controls can help organizations to protect sensitive information, prevent cyberattacks, and reduce the risk of regulatory fines and penalties.
What are Preventive Security Controls?
Preventive security controls are security measures that are designed to prevent security incidents from happening in the first place.
What are Detective Security Controls?
Detective security controls are security measures that are designed to detect security incidents after they have occurred.
What are Corrective Security Controls?
Corrective security controls are security measures that are designed to respond to security incidents and remediate any damage that has been caused.