Module 1: The Cyber Security Framework Flashcards

1
Q

What is Phreaking?

A

Phreaking began in the 1960s when it was discovered that certain whistles could replicate the 2600 Hz pitch used in phone signalling systems in the United States.

https://en.wikipedia.org/wiki/Phreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the Morris Worm?

A

The Morris worm or Internet worm of November 2, 1988, is one of the oldest computer worms distributed via the Internet, and the first to gain significant mainstream media attention.

https://en.wikipedia.org/wiki/Morris_worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was the Estonia Cyber Attacks?

A

Beginning on 27 April 2007, a series of cyberattacks targeted websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters, amid the country’s disagreement with Russia about the relocation of the Bronze Soldier of Tallinn, an elaborate Soviet-era grave marker, as well as war graves in Tallinn.

https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What was the 2011 Playstation Network attack?

A

The 2011 PlayStation Network outage (sometimes referred to as the PSN Hack) was the result of an “external intrusion” on Sony’s PlayStation Network and Qriocity services, in which personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service.

https://en.wikipedia.org/wiki/2011_PlayStation_Network_outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happed during the 2013 Adobe Cyber Security Attack?

A

On October 3, 2013, the company initially revealed that 2.9 million customers’ sensitive and personal data was stolen in a security breach which included encrypted credit card information. Adobe later admitted that 38 million active users have been affected and the attackers obtained access to their IDs and encrypted passwords, as well as to many inactive Adobe accounts. The company did not make it clear if all the personal information was encrypted, such as email addresses and physical addresses, though data privacy laws in 44 states require this information to be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What was the WannaCry Cyber Attack?

A

The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

https://en.wikipedia.org/wiki/WannaCry_ransomware_attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Row Hammer security exploit?

A

Row hammer (also written as rowhammer) is a computer security exploit that takes advantage of an unintended and undesirable side effect in dynamic random-access memory (DRAM) in which memory cells interact electrically between themselves by leaking their charges, possibly changing the contents of nearby memory rows that were not addressed in the original memory access. This circumvention of the isolation between DRAM memory cells results from the high cell density in modern DRAM, and can be triggered by specially crafted memory access patterns that rapidly activate the same memory rows numerous times

https://en.wikipedia.org/wiki/Row_hammer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Log4J vulnerability?

A

A zero-day vulnerability involving remote code execution in Log4j 2, given the descriptor “Log4Shell” (CVE-2021-44228), was found and reported to Apache by Alibaba on November 24, 2021, and published in a tweet on December 9, 2021.[12] Affected services include Cloudflare, iCloud, Minecraft: Java Edition,[42] Steam, Tencent QQ, and Twitter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three important concepts regardign the current state of Cyber Security?

A
  1. No system or network is secure. Hackers find a way!
  2. The more technology evolves and we rely on it, the higher the stakesare when security is compromised.
  3. It is important we adopt and approach new technologies with security in mind.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the average cost of a data breach?

A

$4.2 Million

Up 10% from 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How long on average does it take to identify and contain a cyber incident?

A

287 Days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which country has the costliest data breaches?

A

USA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many security breaches are caused by compromised credentials?

A

1 in 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What percentage of of organizations suffered data breaches in the last 2 years?

A

49%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many businesses suffered business disruption and lost confidential data due to a data breach?

A

44%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the average mitigation cost of a ransomeware attack?

A

$1.85 Million

17
Q

Of what percentage of victims who paid, experienced another attack?

A

80%

18
Q

How much on average does an investigation cost?

A

$400 per hour per consultant

19
Q

What is the average cost of a Business Critical application being down due to a Cyber incident?

A

$200,000 per hour

2022 Splunk State of Security Report

20
Q

How much do Insurance premiums go up due to a Cyber Attack?

A

10 - 30%

21
Q

What are the three points of the CIA Triad?

A
  • Confidentiality
  • Integrety
  • Availability
22
Q

What does the concept of Authorization mean in the terms of Confidentialiy?

A

Sufficient access level granted depending on the person

23
Q

What does the concept of Authentication mean in the terms of Confidentialiy?

A

Verifying the identity of the person to make sure they are who they say they are.

24
Q

What type of data is classed as Restricted?

A

IP or Proprietary Data

25
Q

What type of data is classed as Confidential?

A

Restricted data such as PII and financial

26
Q
A