Unit 5 Attacks, Defence and Risk Based Digital Risk Management Flashcards
Five defences in U.K. Cyber Essentials framework
Use a firewall Secure settings for devices and software Control access to data and services Protect from viruses and other malware Keep devices and software up to date
14 point framework for defence
- Executive support
- Reduce attack surface
- Security architecture
- Classify information assets
- Zone the attack surface
- Remove low value data
- Use next-gen anti-malware
- Strong user access controls
- Dual authentication
- Patch promptly
- Other technical counter measures
- Set security settings high
- Educate users
- Ensure security requirements included and tested
7 root causes of Sony 2014 data breach
Not prepared for breach of this magnitude
Gaps in the defence layers
Patches not up to date
Non existent record retention and destruction procedures for emails increased impact
Information classification processes not in place
Disaffected employee????
No single point of accountability
8 threat actors?
Nation states Terrorist groups Organised criminal groups Hactivist communities Skilled professional hackers Disaffected or opportunistic insiders Amateur hackers and journalists Anyone
2 ways to asses a threat actor?
Motivation and capability?
3 stages in risk management process,
Identify,
Evaluate and prioritise,
Manage
5 stages of typical cybersecurity approach?
Identify Protect Detect Respond Recover
4TS
Tolerate,
treat,
transfer,
terminate
3 key ingredients of cyber risk frameworks
Ownership Who is accountable? Lifecycle Identified, investigating, analyzing, treating, monitoring, closed Risk information Probability and impact
5 ways to treat a risk
Prevention Reduction Acceptance Contingency Transfer
Six step risk based approach to cybersecurity management
Identify highest-value information targets first
Identify the digital assets that information needs to flow through and onto
Verify the business case for how and where information is needed
Consider the threats to the organization and the probability of them occurring
Minimise the footprint of any sensitive data, based on a business case
Then efficiently add the appropriate security controls
What is phishing?
Using an electronic communication eg an email; to get information or install malware.
Cybersecurity for beginners
What is spear phishing?
Targeted phishing pretending to come from a trusted source.
Cybersecurity for beginners
What is polymorphic malware?
Malicious software that can change its attributes to help avoid detection. Mutation process can be automated so function of software continues but method of operation , location and other attributes change. Used in Sony data breach.
Cybersecurity for beginners
What is SSL?
Secure Sockets Layer method for providing encrypted communication between two points in a digital landscape.
Cybersecurity for beginners