uni cyber security Flashcards

1
Q

Security Controls - Directive

A

Encourages users to adopt less risky behaviours. Security training, codes of conduct. Punishment to discourage hacking etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Control - Preventative

A

Stopping risky actions. Requiring passwords, locked doors. Prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an attack vector

A

The means by which a threat actor gains access to a system. Could be malware, phishing, social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Control - Compensating / alternative

A

Implemented in place of those security controls that are too difficult or impractical to implement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Control - Detective

A

Identify an attack. Monitor unsuccessful login attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Control - Corrective

A

Minimise risk when it occurs. Backup power supply ect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Control - Recovery

A

Attempt to recover after an incident. Backups to restore data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Control Considerations

A

1, Are they appropriate?
2, Implemented correctly?
3, Are processes in place to determine if controls are effective?
4, Have they introduced new vulnerabilities?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Legislation that requires organisations to protect data at all times.

A

Data Protection Act 2018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NCSC stands for

A

National Cyber Security Centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reduce the risk of legacy systems by…

A

1, Regularly erasing and rebuilding obsolete systems to remove any malicious software.
2, Treating obsolete systems as unmanaged or untrusted – such systems should have only very limited access to other systems. Should not store sensitive information.
3, Intensive monitoring and logging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When systems are completely isolated from the outside world, this is called….

A

Air-gapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an attack vector?

A

An attack vector is a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the acronym AAA stand for?

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Possible techniques to ensure confidentiality

A

Cryptography, access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is non-repudiation

A

In general, non-repudiation is agreeing to adhere to an obligation. In the context of cyber security, it refers to a property that a sender of a message cannot deny that the message was originated by them.

17
Q

Interception

A

Stopping something or someone from reaching the intended destination

18
Q

Attack vector - Interception

A

The threat actor intercepts and then modifies the information. This is a breach of integrity.

19
Q

Attack vector - Interruption

A

The threat actor interrupts the transfer of data. Breaches integrity and availability.

20
Q

Attack vector - Replay

A

Threat actor sends the same message again to try to solicit a response from the receiver.

21
Q

Attack vector - Fabrication

A

The threat actor fabricates a message after observing message exchanges.

22
Q

Attack vector - Interception- What part of CIA is breached?

A

Confidentiality

23
Q

Attack vector - Modification - What part of CIA is breached?

A

Confidentiality, integrity

24
Q

Attack vector - Interruption - What part of CIA is breached?

A

Integrity and availability. Confidentiality may also be breached.

25
Q

Attack vector - replay - What part of CIA is breached?

A

Integrity and confidentiality - possibly a breach of availability

26
Q

Attack vector - fabrication - What part of CIA is breached?

A

Integrity and confidentiality