Safeguard Flashcards

1
Q

10 Domains of Cybersecurity

A

1) Legal, regulatory, compliance and investigation
2) Information security and risk management
3) Security architecture and design
4) Telecommunication, network and internet
5) Access
6) Operations security
7) Physical and environmental security
8) Application security
9) Business continuity and disaster recovery
10) Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1) Legal, regulation, compliance and investigation

A

Cybercrimes = connected to information assets and IT (Salami Attacks, Social Engineering, Dumpster Diving, Password Sniffing)

Cyberlaws = laws and regulations to prevent,investigate, and prosecute cybercrimes. Most are protecting consumer privacy.

Cyber forensics = involves collecting, examining, and preserving evidence of cybercrimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2) Information security and risk management

A

Information security and risk management = preventive and proactive measures taken to prevent cybercrimes

Information security = policies and procedures required to secure information assets, including IT hardware, software, and stored data.

Information risk management = manages the risk related to information assets and IT and is part of the larger enterprise risk management (ERM).

Principles = Confidentiality, Integrity and Availability

3 Controls = Administrative, Technological/Logical, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3) Security architecture and design

A

Security architecture and design = security for IT architecture of computers, networks, and databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4) Telecommunication, network and internet

A

Telecommunication, network and internet = relate to data transmission

Network access points (NAP) = Routers, bridges, and gateways

Firewalls = Software programs that control traffic
between two networks can be installed on these
routing devices to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

5) Access

A

Access = security for access to enterprise system (computers, networks, routers and databases)

4 Principles: Identification, Authentication, Authorization, and Accountable

Threats - Network sniffers (devices that examine traffic on network), Phishing (social engineering to fish personal info), Identity Theft (impersonate to do fraud), Password Attacks, Fake Log-In windows

Fix Attempt -Intrusion prevention systems (IPS) = to prevent cyberattacks from occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

6) Operation Security

A

Operation Security = activities and procedures to keep IT running securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

7) Physical and environmental security

A

Physical and environmental security = literal security via physical components ad Information assets. (Ex. natural environmental disasters, supply system threats, man-made threats and politically motivated threats)

-Build grounds to protect assets and deter intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

8) Application Security

A

Application Security = security and controls for application software, including input, processing, and output (Ex. accounting spreadsheet software)

Threats -Malware (malicious software) = spread throughout an enterprise system by email, fake advertisements, Internet downloads, and shared drives (Bots, Worms, Logic Bombs, Virus, Trojan Horses, Spam)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

9) Business continuity and disaster recovery

A

Business continuity and disaster recovery = minimize disruption, damage and loss, provide temporary method for business, resume normal operations quickly

-Accounting data backups are critical and should be
scheduled on a regular basis.

Grandfather-Father-Son method involves making multiple backups, one each day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

10) Cryptography

A

Cryptography= secure data during transmission and storage, ensure confidentiality, maintain integrity. Encoding data in a form that only sender and intended receiver understand. (Algorithm + Key)

Encryption = method of converting plaintext data into an unreadable form called ciphertext.

Ciphertext = converted back to plaintext using decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly