SESSION 03: Perspectives of cyber security Flashcards

1
Q

What are the trends against cyber security?

A
  1. IoT with 5G creates new cyber security threats
  2. Targeted ransomware attacks
  3. Evolution of multi-factor authentication
  4. Increased attacks on cloud-based services
  5. New tools to Combat remote work vulnerability
  6. Organizations invest in Real-time data monitoring
  7. More social engineering attack
  8. Increased demand for cyber security professionals
  9. Rise of automative hacking
  10. Potential of AI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IoT with 5G creates new cyber security threats?

A

The rapid growth of new technologies, especially the Internet of Things (IoT), has led to a surge in cyber-attacks. IoT involves billions of devices that collect and share data online, increasing the chances for cyber-attacks. With 5G networks supporting more IoT devices, the risk becomes even greater as each connected device can be a target. The speed and capacity of 5G make it easier for attackers to launch large-scale attacks. Traditional security systems may struggle with the massive data flow in 5G networks, and edge computing adds new vulnerabilities. Additionally, 5G networks rely on a global supply chain, so any weak link can compromise the entire network. With IoT devices transmitting personal data, ensuring privacy and strong security is critical. Regulations often lag behind technology, making it harder to keep systems safe from evolving threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Targeted ransomware attacks?

A

Targeted ransomware is a type of malware that locks important files or networks, demanding payment, usually in cryptocurrency, to restore access. Attackers often focus on high-value targets like large companies, hospitals, governments, and schools. They breach systems through phishing, weak software, or stolen credentials, then encrypt crucial data to disrupt operations. The average ransom demand in 2020 was $200,000, with some reaching millions. A common tactic is “double extortion,” where attackers also threaten to release sensitive data if not paid. To prevent attacks, organizations need strong cybersecurity, regular updates, employee training, and backups. The number of ransomware attacks is expected to keep growing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Evolution of Multi-Factor Authentication?

A

Multi-factor authentication (MFA) is a security method that requires users to provide two or more forms of identity proof to access a website or application. Initially, MFA used passwords combined with something the user had, like a hardware token. As technology advanced, mobile phones became a second factor through SMS or app-based codes. Biometrics, like fingerprints or facial recognition, further improved security.

Newer methods include push notifications, where users approve access on their phone after entering a password. Adaptive MFA adjusts security based on factors like location or behavior, making it harder for attackers. USB-based security keys are also popular for added protection, using advanced encryption to block phishing attempts.

MFA is increasingly moving to the cloud, making it easier to manage and scale. Standard protocols like FIDO2 ensure compatibility across platforms. The future of MFA may use AI and machine learning to improve security further. However, methods like SMS and voice authentication are becoming less secure, with companies like Microsoft advising against their use due to vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Increased Attacks on Cloud-Based Services?

A

Cloud-based services face growing cyberattacks, especially with remote work. Misconfigurations by users often cause data breaches and unauthorized access. Attackers target cloud platforms using advanced methods, while stolen credentials through phishing remain a big threat.

Ransomware attacks on cloud services are also rising, causing data loss. To stay secure, organizations should use multi-factor authentication, encryption, regular security checks, and train employees on cybersecurity. Even with strong provider security, user mistakes remain a major risk. Staying vigilant and updating security measures is crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

New Tools to Combat Remote Work Vulnerability?

A

As remote work increases, companies use new tools to handle cybersecurity risks. Zero Trust ensures strict identity checks, while EDR monitors devices in real-time. Tools like SASE, advanced VPNs, and CASB help secure remote access and cloud use. Behavioral analytics detect unusual activity, and technologies like containerization isolate threats. Training and quick incident response are essential to protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Organizations Invest In Real-Time Data Monitoring?

A

Real-time data monitoring helps organizations quickly detect and respond to cybersecurity threats by continuously tracking network traffic, system logs, and user activities. It uses advanced analytics and machine learning to spot unusual behavior that might indicate attacks. This proactive monitoring limits the damage from cyberattacks and keeps operations running smoothly.

Organizations also use threat intelligence and cloud-based monitoring tools for better protection. Automation helps speed up response actions like blocking suspicious activities. Training cybersecurity teams is key to making the most of these tools. Spending on cybersecurity is expected to keep rising, as protecting digital data remains a top priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering Attacks?

A

A social engineering attack tricks people into giving away sensitive information or performing actions that compromise security, often by manipulating trust or emotions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering attack types?

A
  1. Baiting:
    Leaving infected devices (flash drives) for someone to find and use, which install malware on their system.
  2. Quid Pro Quo:
    Hackers offer something in return for sensitive information or login credentials, often pretending to be tech support.
  3. Phishing:
    Sending fake, urgent messages to trick users into revealing sensitive information.
  4. Spear Phishing:
    Targeting specific individuals with personalized messages, often using details from social media or company websites.
  5. Whaling:
    A type of spear phishing aimed at high-profile individuals in an organization to gain sensitive corporate information.
  6. Vishing:
    Using phone calls to trick people into giving confidential information or performing certain actions.
  7. Pretexting:
    Creating a false scenario to obtain information, often as part of a larger scheme.
  8. Tailgating:
    Gaining physical access to secure areas by following authorized
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reasons for rapidly growing of cyber security?

A
  1. Hackers are getting smarter
  2. Cybercrime is expensive
  3. Everything is automated
  4. Vulnerabilities are everywhere
How well did you know this?
1
Not at all
2
3
4
5
Perfectly