Unit 1: Cybersecurity Principles Flashcards

1
Q

“RAM”?

A

Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

“ROM”?

A

Read Only Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference in RAM and Storage (as human equivalent)

A

RAM=short-term memory

Storage=long-term memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purpose of IEEE

A

Creating standards for electronics manufacturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Complexity principle (re: compromise)

A

More complicated = less likely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Principle of ‘security’

A

Security exists only so far as the ability to prevent threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Outline Log4j attacks.

A

Hackers exploiting vulnerability in Java in the back end to access a user’s command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Catfishing?

A

-Attacker poses as attractive person online
-Defrauds victim who is now in love with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define ‘Advanced Persistent Threat’ (3)

A
  1. Sophisticated, sustained cyber attack; 2. Intruder establishes undetected presence;
  2. To steal data over a long time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between LAN and WAN.

A

LAN = Router looks inside to groups of devices;

WAN = LANs connected by Internet Service Providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define ‘Source Code’.

A

A text listing of commands to be compiled or assembled into an executable program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Language used to write (most) operating systems.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Outline ‘Supply Chain Attack’ (3)

A
  1. Attacker infects software upstream in the supply chain; 2. Malware spreads to other area in the network; 3. Allows access to sensitive data in downstream organisations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Boolean Operator? (2)

A
  1. A word or phrase connecting search terms; 2. To create a logical phrase understandable to database.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of Boolean Operators (3) and their functions (3).

A
  1. AND: requires both search terms to be present.
  2. OR: one or the other term must be present in result.
  3. NOT: excludes search results that contain the search term.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Search for scissors on Italian websites using Google Dorking.

A

“scissors” site:.it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Search for A-Level Mathematics Results on the UCAS website only.

A

“A-level mathematics results” site:ucas.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Search for cybersecurity, but only for results related to hacking.

A

“cybersecurity” AND “hacking”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Hazard?

A

Potential issue that may lead to vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Vulnerability?

A

Actual weaknesses open to exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Risk?

A

Potential exposure to breach and the impacts of breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Give examples of Cybersecurity hazards (3)

A
  1. Using online database.
  2. Located in a particular country.
  3. Dealing with certain types of clients/industries.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Give examples of Cybersecurity (3)

A
  1. Physical/Social: real-world, people.
  2. Logical: software, network.
  3. External: 3rd-party dependence.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Give examples of things breaches can impact (5)

A
  1. Uptime.
  2. Operations.
  3. Damaged services.
  4. Costs to Reputation.
  5. Penalty costs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The three protection goals in information security.

A

Confidentiality, integrity, availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define “confidentiality”

A

Preventing unauthorised gain of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define “integrity“

A

Prevention or detection of unauthorised data modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define “integrity“

A

Prevention or detection of unauthorised data modification

29
Q

Define “availability”

A

Prevention of unauthorised deletion or disruption

30
Q

Define “availability”

A

Prevention of unauthorised deletion or disruption

31
Q

The two types of data that protection goals apply to

A
  1. Data at rest
  2. Data in transit.
32
Q

Define “data at rest”

A

Data stored on a computer or on paper

33
Q

Define “data in transit”

A

Data being sent over a network

34
Q

Define “ authorised actor”

A

Person authorised to access a store of data

35
Q

Give an example of accessibility in relation to data stored on a smart phone

A

Back ups to the cloud in case of machine failure

36
Q

Define “authenticity” as a protection goal

A

Preventing actors from impersonating someone else

37
Q

Define “non-repudiation” as a protection goal

A

Preventing actors from denying that they carried out a particular act

38
Q

Why are non-repudiation and authenticity necessary protection goals?

A

In order to hold actors accountable

39
Q

What is the goal of computer security?

A

To protect valuable assets

40
Q

What are assets in relation to computer security? (3)

A

Hardware, software and data

41
Q

Define “threat”

A

Any occurrence that may result in asset loss or damage

42
Q

Define “information security”

A

Protection of data and any information derived from its interpretation

43
Q

Define “system security” (2)

A
  1. Ensuring computer systems work as intended 2. by protecting them from attack.
44
Q

What is authentication?

A

Requiring users to enter a password

45
Q

What are access controls?

A

Rules that govern the information a user can access

46
Q

Examples of how to achieve confidentiality in system security (2)

A
  1. Data encryption.
  2. combination of authentication and access controls.
47
Q

What are “ cyber–physical systems”?

A

Systems affecting the real world

48
Q

List five examples of cyber-physical systems (5)

A
  1. Traffic lights.
  2. Hospital respirators.
  3. Power plant control systems.
  4. Auto pilot.
  5. Industrial robots.
49
Q

What is critical infrastructure?

A

Systems which have a significant impact on society if they fail

50
Q

Difference between safety and security

A

Safety: protects against non-malicious threats

Security: protects against malicious threats

51
Q

What are benign threats?

A

Threats due to human errors

52
Q

What are malicious threats?

A

Threat due to bad intentions

53
Q

What are random attacks?

A

Attacks where victim is not important so long as there is gain

54
Q

What is a targeted attack?

A

Strategic attack directed at a particular victim

55
Q

Define “vulnerability“ (2)

A
  1. A flaw or weakness in the systems design implementation or operation and management 2. that could be exploited to violate the systems security policy.
56
Q

How to decide the severity of a risk

A
  1. Impact of possible attack.
  2. Likelihood of attack taking place.
57
Q

What are the four ways of handling risks? (4)

A
  1. Avoidance.
  2. Mitigation.
  3. Transfer.
  4. Acceptance.
58
Q

How to avoid risk

A

Refrain from implementing a feature

59
Q

How to avoid risk

A

Refrain from implementing a feature

60
Q

How to mitigate risks

A

Implement counter measures to decrease impact and/or likelihood

61
Q

How to transfer risks

A

Buy insurance or levy impact onto another party

62
Q

How to transfer risks

A

Buy insurance or levy impact onto another party

63
Q

What is risk acceptance?

A

Deciding to cover the cost of an attack

64
Q

What is a “negative externality “in relation to risk?

A

System designers transfer risk to the users of system

65
Q

What is “negative externality“ in relation to risk?

A

Designers of system transfer threat impact to the users

66
Q

Problem created by negative externality

A

Lower incentive for designers to create highly secure systems

67
Q

Problem created by negative externality

A

Lower incentive for designers to create highly secure systems

68
Q

Define “sensitive data” (6)

A

Data revealing: ethnic origin, political opinions, beliefs, trade union membership or concerning health or sex life

69
Q

Define “personally identifiable information“ (3)

A

Information that (1) identifies, (2) describes or (3) is unique to an individual.