Module 3: Cyberattacks and Cybersecurity Flashcards

1
Q

What factors have contributed to the increase in the number, variety, and severity of security incidents.

A

Increasing computing complexity, expanding and changing systems, an increase in the prevalence of BYOD policies, and growing reliance on software with known vulnerabilities, and the increasing sophistication of those who would do harm have caused a dramatic increase in security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an exploit in the context of computer security?

A

An exploit is an attack on an information system that takes advantage of a particular system vulnerability, often due to poor system design or implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who are the different types of individuals that launch computer attacks and what are their motivations?

A

The different types of people who launch computer attacks include black hat hackers, crackers, malicious insiders, industrial spies, cybercriminals, hacktivists, and cyberterrorists, each with different motivations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of a white hat hacker?

A

A white hat hackers is someone who has been hired by an organization to test the security of its information systems, allowing the organization to improve its defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some of the most common types of computer exploits?

A

Ransomware, viruses, worms, Trojan horses, logic bombs, blended threats, spam, DDoS attacks, rootkits, advanced persisten threats, phishing, spear phishing, smithing, vishing, cyberespionage, and cyber terrorism are among the most common computer exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of the Department of Homeland Security (DHS) in cybersecurity?

A

The DHS has the responsibility to provide for a “safer, more secure America, which is resilient against terrorism and other potential threats.” The agency’s OFfice of Cybersecurity and COmmunications is responsible for enhancing the security, resilience, and reliability of U.S. cyber and Communications infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of the US-CERT partnership?

A

The US-CERT is a partnership between DHS and the public and private sectors established to protect the nation’s internet infrastructure against cyberattacks by serving as a clearinghouse for information on new viruses, worms, and other computer security topics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What laws have been enacted to prosecute those responsible for computer-related crime?

A

Several laws have been enacted to prosecute those responsible for computer-related crime, including the Computer Fraud and Abuse Act, the Fraud and Related Activity in Connection with Access Devices Statute, the Stored Wire and Electronic Communications and Transactional Records Access Statutes, and USA Patriot Act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the key focuses of IT security practices to ensure a strong security program?

A

The IT security practices of organizations must focus on ensuring confidentiality, maintaining integrity, and guaranteeing the availability of their systems and data, referred to as the CIA security triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What levels should an organization’s security strategy encompass?

A

An organizaiton’s security strategy must include security measures that are planned for, designed, implemented, tested, and maintained at the organization, network, application, and end-user levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should be included in a risk-based strategy to minimize the impact of security incidents?

A

A risk-based strategy should include a risk assessment to identify and prioritize threats, a well-defined disaster recovery plan, security policies, periodic security audits, compliance standards, and a security dashboard to track key performance indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the concept of reasonable assurance mean in the context of IT security?

A

The concept of reasonable assurance in IT security recognizes that managers must use their judgment to ensure that the cost of control does not exceed the benefits or risks involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the key elements of the network security layer?

A

Key elements of the network security layer include authentication methods, a firewall, routers, encryption, proxy servers, VPN, and an intrusion detection system (IDS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the key elements of the application security layer?

A

The key elements of the application security layer include authentication methods, user roles and accounts, and data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key elements of the end-user security layer?

A

Key elements of the end-user security layer include security education, authentication methods, antivirus software, and data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is it important to monitor systems and procedures to detect possible intrusions?

A

No security system is perfect, so systems and procedures must be monitored to detect a possible intrusion.

17
Q

What should a response plan include, and who should approve it?

A

A response plan should be developed well in advance of any incident and be approved by both the organization’s legal department and senior management. The response plan should address notification, evidence protection, activity log maintenance, containment, eradication, and follow-up

18
Q

What proactive measures should organizations take to prevent successful security intrusion?

A

Organizations must impelement fixes against well-known vulnerabilities and conduct periodic IT security audits.

19
Q

What is the role of a managed Security Service provider (MSSP) in handling security intrusions?

A

Many organizations outsource their network security operations to an MSSP, which is a company that monitors, managers, and maintains computer and network security for other organizations.

20
Q

Why is computer forensics important in the aftermath of a security intrusion?

A

Organizations must be knowledgeable of and have access to trained experts in computer forensics to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

21
Q
A