Security Flashcards

1
Q

Explain the principles of data security and control

A

Confidentiality: Ensuring that data is accessible only to authorized individuals.
Integrity: Maintaining the accuracy, completeness, and consistency of data over its entire lifecycle.
Availability: Ensuring that data is readily available to authorized users when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the common security threats to computer systems and data?

A

Malware (viruses, worms, Trojans).
Phishing and social engineering.
Denial of Service (DoS) attacks.
Unauthorized access.
Physical threats (theft, damage).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe different types of malware and their impacts

A

Viruses: Attach to files and spread between systems, causing damage or data loss.
Worms: Self-replicate and spread without user interaction, often causing network congestion.
Trojans: Disguise as legitimate software to trick users into installing them, leading to data theft or system control.
Spyware: Secretly monitors user activity and collects sensitive information.
Ransomware: Encrypts data and demands a ransom for its release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the control measures to mitigate security threats like phishing and social engineering?

A

Educate users about recognizing phishing attempts and social engineering tactics.
Implement email filters to detect and block suspicious messages.
Use multi-factor authentication to verify user identity.
Regularly update and patch systems to fix vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define and provide examples of different types of computer crimes.

A

Hacking: Unauthorized access to computer systems (e.g., breaking into a company’s network).
Cyberstalking: Using technology to harass or intimidate individuals (e.g., repeated threatening emails).
Cyber Theft: Stealing data or financial information (e.g., identity theft).
Cyber Terrorism: Using technology to cause disruption for ideological purposes (e.g., attacking critical infrastructure).
Cyber Espionage: Stealing trade secrets or classified information through digital means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can firewalls and intrusion detection/prevention systems help in detecting and protecting against computer crimes?

A

firewalls: Monitor and control incoming and outgoing network traffic based on predetermined security rules.
Intrusion Detection/Prevention Systems (IDS/IPS): Detect and respond to security threats, often by monitoring network traffic for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the role of penetration testing and incident response planning in cybersecurity.

A

Penetration Testing: Simulates cyber-attacks to identify and address vulnerabilities in systems and networks.
Incident Response Planning: Develops procedures to respond to and recover from security incidents, minimizing damage and restoring normal operations quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the key laws and regulations governing the protection of ICT and data?

A

Data Protection Laws: Regulate the processing and protection of personal data (e.g., GDPR).
Cybercrime Laws: Criminalize illegal activities related to computer systems and data (e.g., Computer Fraud and Abuse Act).
Intellectual Property Laws: Protect copyrights, trademarks, and patents in the digital realm.
Privacy Laws: Safeguard individuals’ privacy rights in the digital age.
Cybersecurity Laws: Establish standards and guidelines for securing critical infrastructure and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do data protection laws regulate the processing and protection of personal data?

A

Regulation: Data protection laws mandate that personal data must be processed lawfully, fairly, and transparently. They require organizations to implement appropriate security measures to protect data, obtain consent for data processing, and allow individuals to access and control their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Discuss the importance of cybersecurity laws in securing critical infrastructure and systems.

A

Importance: Cybersecurity laws establish standards and guidelines for protecting critical infrastructure (e.g., power grids, financial systems) and ensuring the resilience of information systems against cyber threats. These laws help mitigate risks, protect national security, and ensure the continuity of essential services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name five types of malware.

A

Viruses, worms, Trojans, spyware, ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you protect against phishing and social engineering?

A

Educate users, implement email filters, verify identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you protect against DoS Denial of Service (DoS) Attacks attacks?

A

Use intrusion detection/prevention systems, load balancing, redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you protect against unauthorized access?

A

Implement strong authentication mechanisms, access controls, and audit logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you protect against physical threats?

A

Use locks, surveillance, access control systems, and environmental controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is hacking?

A

Unauthorized access to computer systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is cyberstalking?

A

Using technology to harass, intimidate, or stalk individuals

18
Q

What is cyber theft?

A

Stealing data, identities, or financial information through digital means

19
Q

What is cyber terrorism?

A

Using technology to cause disruption or fear for ideological purposes.

20
Q

What is cyber espionage?:

A

stealing trade secrets or classified information through cyber means.

21
Q

What is the purpose of a firewall?

A

Monitor and control incoming and outgoing network traffic.

22
Q

What do Intrusion Detection/Prevention Systems (IDS/IPS) do?

A

Detect and respond to security threats.

23
Q

What is Security Information and Event Management (SIEM)

A

Collect and analyze security data from various sources.

24
Q

What is the purpose of penetration testing?

A

Identifying and addressing vulnerabilities in systems and networks.

25
Q

What is incident response planning?

A

Developing procedures to respond to and recover from security incidents.

26
Q

Laws Governing Protection of ICT

A

Data Protection Laws.
Cybercrime Laws.
Intellectual Property Laws.
Privacy Laws.
Cybersecurity Laws.

27
Q

What do data protection laws regulate?

A

The processing and protection of personal data.

28
Q

What do cybercrime laws criminalize?

A

Illegal activities related to computer systems and data

29
Q

What do intellectual property laws protect?

A

Copyrights, trademarks, and patents in the digital realm.

30
Q

What do privacy laws safeguard?

A

Individuals’ privacy rights in the digital age.

31
Q

What do cybersecurity laws establish?

A

Standards and guidelines for securing critical infrastructure and systems.

32
Q

Detection and Protection against Computer Crimes

A

Firewalls.
Intrusion Detection/Prevention Systems (IDS/IPS)
Security Information and Event Management (SIEM).
Penetration Testing.
Incident Response Planning.

33
Q

Types of Computer Crimes:

A

Hacking
Cyberstalking.
Cyber Theft.
Cyber Terrorism.
Cyber Espionage.

34
Q

Security Threats and Control Measures

A

Malware
Phishing and Social Engineering.
Denial of Service (DoS) Attacks.
Unauthorized Access.
Physical Threats.

35
Q

Data Security and Control:

A

Data Confidentiality.
Data Integrity.
Data Availability.
Access Control.
Encryption.
Backups and Recovery.

36
Q

Data confidentiality

A

Ensuring that data is accessible only to authorized individuals.

37
Q

Data Integrity

A

Maintaining the accuracy, completeness, and consistency of data over its entire lifecycle.

38
Q

Data Availability

A

Ensuring that data is readily available to authorized users when needed.

39
Q

Access Control

A

Implementing measures to control and limit access to data and systems.

40
Q

Encryption

A

Converting data into a coded format to protect it from unauthorized access.

41
Q

Backup and Recovery

A

Creating copies of data to restore in case of data loss or corruption