Parcial 1 Flashcards

1
Q

What is cybersecurity?

A

protection of networked system and data from unathorized use or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is offline identity

A

your identity that interacts on a regular basis at home, school or work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is online identity?

A

your identity while you are in cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does the online identity should have?

A

limited amount of information and username or alias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the rules to have a safe online identity?

A

not include any personal information. be apropiate and respectful, and not attract unwanted attention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of data do you have?

A

medical records, education records and employment and financial records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how do the criminals get your moneu?

A

online credentials and creative schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does online credential means?

A

give thiefs access to your accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does creative schemes mean?

A

trick into wiring money to your friends or family

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

why do the criminals want your identity

A

for long term profits, medical benefits, file a fake tax return, open credit card accounts and obtain loans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the types of organizational data?

A

Traditional data and internet of the things and big data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what data does traditional data has?

A

personell (application materials, payroll, offer), intellectual (patents, trademarks, trade secrets), and financial (income statements, balance sheets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what data does the internet of things and big data has?

A

IoT (large network of pyshical objects such as sensors) and big data (data from the IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does confidentiality means

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does integrity means

A

accuracy and thrustworthiness of the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what does availability means

A

information is accesible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are the types of attackers?

A

amateurs, hackers and organized hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what does amateurs mean

A

script kiddies with little to no skill, and the use of existing tools or instructions found online for attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what kind of hackers are?

A

white hats, grey hats and black hats

20
Q

what does white hats mean

A

people that break into a system with permission to discover weakness so that the security of these systems can be improved

21
Q

what does gray hats mean

A

people who compromise systems without permission

22
Q

what does black hats mean

A

people who take advantage of any vulnerability for illegal personal, financial or political gain

23
Q

what does organized hackers mean

A

organizations of cyber criminals, hacktivists, terrorits and state-sponsored hackers

24
Q

whats one example of internal security threats

A

an employee or contract partner

25
Q

why is an employee or contract partner an internal security threat

A

because they can mishandle confidentia data, threaten the operations of internal servers or network infraestructure devices, facilitate outisde attacks by connecting infected USB media into the corporate computer system, accidentally invite malware onto the network through malicious email or websites and can cause great damages because of direct access

26
Q

what does esternal seurity threats mean

A

exploit vulnerabilities in network or computing devices and the use of social engineering to gain access

27
Q

what is the cyberwarfare

A

conflict using the cyberspace

28
Q

what does the stucnet malware did?

A

designed to damage irans nuclear enrichment plan, using modular coding and stole digital certificates

29
Q

what is one example of an impact of security breach

A

vtech a toy maker for children that exposed sensitive information including customer names, etc hackers could create email accounts and apply for credits and commit crimes using the children’s information

30
Q

what is an example of cyberwarfare

A

stuxnet malware

31
Q

what is the purpose of the cyberwarfare

A

to gain advantage over adversaries, nations or competitos

32
Q

what does the cyberwarfare can do

A

sabotage the infraestructure of other nations, give the attackers the ability to blackmail governmental personnel, citizens may lose confidence in the government’s ability to protect them and can affect the citizen’s faith in their government without ever physically invading the targeted nations

33
Q

what is a security policy?

A

A directive that defines a specific behavior for one or more individuals within the corporation

34
Q

for what is designed a security policy?

A

to reduce a specific set of security risks to a level accpetable to manage

35
Q

what is the essential foundation of an effective information security program?

A

policy

36
Q

why is policy so important

A

because it sets the tone and emphasis on the importance of information security

37
Q

what are the objetives of a security policy

A

reduce risk, compliance with laws and regulations and assurance of operational continuity, information integrity and confidentiality

38
Q

what are the least expensive means of control and often the most difficult to implement

A

policies

39
Q

what are the basic rules for shaping a policy

A

should never conflict with the law, must be able to stand up in court if challenged and must be properly supported and administrated

40
Q

what are the types of information securoty policy

A

enterprise information security program policy, issue-specific information security policies and systems specific policies

41
Q

what is the basic security polity process

A

indetify what assets you need to protect, identify the threats to those assets, use frameworks and industry specific guidelines to select and implement controls to mitigate threats, monitor compliance and effectiveness of controls(metrics) and periodically review and update controls

42
Q

what type of controls are to mitigate threats in a bsaic security policy?

A

policies and procedures, technical controls and human controls

43
Q

a security policy is created through an analysis of what information?

A

pertinent legislation and regulations, agreements with other parties, higher level policies, detailed knowledge of the target IT system, anticipated threats, implementation and operational costs, and managment risk tolerance

44
Q

success is dependent on four interdependent components

A

strong upper level managment support, practival security policies and procedures, properly implemented controls and quantifiable performance metrics and analysis

45
Q

what are the common problems of policies

A

systems are already developed, personnel are already in place with various levels of training, some policy may exist, some proceudres may be in place, some controls are in place and some metrics may be used to measure compliance

46
Q

what should i do to build an effective security policy

A

organize your security policy development team, conduct a security self assessment, assess security risks, develop a risk mitigation strategy, measure your security controls, and formalize and write your security policy

47
Q

what should the security policy development team should do

A

obtain leadership and involment of senior managment, identify and recruit internal and external stakeholders and obtain ther input and support