Module 3: Managing cybersecurity Flashcards
1
Q
What is cybersecurity
A
Technologies, processes and practices put in place to protect data, devices, programs or networks from damage, malicious attacks and unauthorised access
2
Q
Phishing
A
- When receiving an email, always be cautious and check who the sender is
- Be cautious before you click any hyperlinks in your emails, they can be dangerous
- receiving unknown email attachments are like receiving suspicious packages
- Look out for urgent, threatening lanaguage
- type in correct website address yourself, look out for lock icon, websites start with https
- Concept of C.I.A
3
Q
What is C.I.A
A
- Confidentiality - ensure data or information cannot be read by unauthorized personnel
- Integrity - data or information held by NTU remains accurate and unmodified by unauthorized personal
- Availability - data or service remains usable with sufficient capability to deliver our educational services
4
Q
Strong passwords
A
- at least 8 letters with the use numbers/symbols and upper lower case letters
- use uncommon/ non-standard words or can create from a sentence
- dont use personal info like birthday
- enable 2 factor aunthentication
- use different passwords
5
Q
Data security
A
- data can be in both physical and digital formats. It can belong to an individual or an organisation
- Data is classified into 4 levels of security
1. open: publicly available info
2. restrict: accessible to only certain groups
3. confidential: sensitive info that needs to be protected
4. classified: top secret
6
Q
Good IT practices
A
- lock your workstation when leaving your desk
- adopt a clean desk policy and keep your desk clear
- send and store work information through organisation accounts
- keep your data storage devices securely
- Choose trusted wifi networks, avoid doing sensitive transactions/ confidential work
- Always use BCC instead of CC when sending mass emails
- install up to date anti virus software
7
Q
Pass acronym
A
- Helps to practice good cyber hygiene
1. Password
2. Antivirus
3. Spots signs of phishing
4. Software application