Test 2 Flashcards

1
Q

T O F:
It is impossible for organizations to provide perfect security

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Security

A

can be defined as the degree of protection against criminal activity, danger, damage, or loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Information Security

A

all of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define a Threat to an information resource

A

A threat to an information resource is any danger to which a system may be exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define the Exposure of an information resource

A

The exposure of an information resource is the harm, loss, or damage that can result if a threat compromises that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define an information resource’s vulunerability

A

An information resource’s vulnerability is the possibility that a threat will harm that resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 Key Facts contributing to the increasing vulnerability of organizational information resources

A

1.Today’s interconnected, interdependent, wirelessly networked business environment

2.Smaller, faster, cheaper computers and storage devices

3.Decreasing skills necessary to be a computer hacker

4.International organized crime taking over cybercrime

5.Lack of management support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 major categories of threats in information security?

A

The 2 major categories of threats are unintentional threats and deliberate threats.

Unintentional threats are acts performed without malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Social Engineerings

A

An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information, such as passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Social Engineering

A

Phone Calls- why weren’t u in court?

Physical- hey I’m with IT

Tailgating- following in 320 lol

Soulder Surfing- watch you put password on phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Fishing Attacks?

A

Phishing Attacks: use deception to acquire sensitive personal information by masquerading as official-looking e-mails, instant messages or te

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of fishing attacks

A

Spear Phishing Attacks: personalized phishing attacks that target specific individuals or organizations

Whaling Attacks: spear phishing towards high-value individuals to steal sensitive info from companies (usually targeting executives and HR departments)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are deliberate cyber threats?

A

Theft of Equipment or Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some examples of deliberate threats

A

Identity Theft

Compromises to Intellectual Property

Software Attacks

Ransomware

Doxxing

Bots/Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Malware

A

MALICIOUS software designed to wreak havoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Ransomware

A

Blocks access to an individual computer or an organization’s computer system/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Ransomware

A

Blocks access to an individual computer or an organization’s computer system/network

18
Q

Define Doxxing

A

cybercriminals threaten to release the data to the public (private / sensitive customer data).

19
Q

What is a bot master / bot herder?

A

Bot Master / Bot Herder- Person Over the Botnet
Bot: Infected Computer
Botnet: A bunch

20
Q

Alien Software (pestware)

A

Adware, spyware, Spamware, Keystroke lovers, screen scrapers, stalkerware

21
Q

What are some examples of alien software

A

Adware- Ads

Spyware – collects personal information about users without their consent.
Keystroke loggers (keyloggers) = records your keyboard strokes & internet browsing history
Screen scrapers = record a “movie” of screen contents and activities
Stalkerware = powerful surveillance functions which include keylogging, making screenshots, monitoring internet activity, recording location, recording video and
phone calls, and intercepting app (Skype, Facebook, WhatsApp, Snapchat iMessage,etc) communications

22
Q

What are SCADA attacks

A

Supervisory control and data acquisition (SCADA) attacks

Important infastructure

Used to monitor or to control chemical, physical, and transport processes – such as those used in oil refineries, water/sewage treatment plants, electrical generators, and power plants.

SCADA systems control equipment (open/close valves, pumps, pressure, flow, voltage, current, etc)

Think Utilities (power/water) or Nuclear Facility cyber attack

23
Q

What is cyberterrorism

A

Cyber attacks carried out by individuals or groups

24
Q

What is cyberwarfare

A

Cyber attack related to government

25
Q

What is information security

A

Information Systems are vulnerable to many potential hazards and threats. The 2 major categories of threats are unintentional threats and deliberate threats.

26
Q

What is the most common level of attacks

A

Phishing and spear phishing

27
Q

How Can Organizations Protect
Against Malware / Ransomware &
Other Threats?

A

Education
Information Security Controls
Risk Management

28
Q

What is the most valuable control for protecting against threats

A

The single most valuable control is user education and training.
Effective and ongoing education makes every member of the organization aware of the vital importance of information security.

29
Q

What are the major types of information security controls

A

Physical controls
Access controls
Communication controls

30
Q

What does Access controls consist of

A

Prevent unauthorized individuals from using information resources (Passwords, Biometrics)

Multi-factor authentication

31
Q

What is Encryption

A

Encryption: process of converting (scrambling) an original message into a form that cannot be read by anyone except the intended receiver

32
Q

What is Transport Layer Security (TLS):

A

secures transactions on the internet (credit card purchases/online banking); encrypts and decrypts data between a Web server and browser

33
Q

What is the goal of risk management

A

The goal of risk management is to identify, control, and minimize the impact of threats.

Seeks to reduce risk to acceptable levels (impossible to eliminate all risk)

34
Q

What are the 3 most common Risk Mitigation strategies

A

Risk Acceptance: accept the potential risk, continue operating with no controls, and absorb any damages that occur

Risk Limitation: limit the risk by implementing controls that minimize the impact of the threat

Risk Transference: transfer the risk by using other means to compensate for the loss (buying insurance, 3rd party vendor)

35
Q

What is an common example of a wide area network (WAN)

A

INTERNET is a type of WIDE AREA NETWORK

36
Q

What is authentication

A

is that person supposed to be allowed to access the network

37
Q

What is authorization

A

they’re supposed to be here but what should they have access to?

38
Q

What is network protocols

A

How devices communicate with each other.

For computers & devices to communicate with each other, they have a common set of rules and procedures – known as protocol
Protocols dictate how data is formatted, transferred & received

39
Q

What are internet addresses

A

Each computer on the internet has an assigned address, called the IP address (internet protocol address) that distinguishes it from all other computers

Your IP address is assigned to you when you login to a network or your service provider

40
Q

What is the internet backbone

A

Primary network connections that link fiber cables connecting the whole world