Week 1 - Intro Flashcards

1
Q

What does Cyber Security comprise?

A

Technologies and mechanisms that are designed to protect systems, networks and data from cyber attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber Security Objectives

A

prevent unauthorised:
- disclosure of data
- modification of data
- use of network or computing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber Security challenges:

A
  • Considering potential attacks.
  • Where to use security mechanisms: Physical placement and logical sense
  • Security Key management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset

A

Anything of value to the organisation and requires protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability

A

Weakness of an asset or group of assets that can be exploited.

Bugs, protocol flaws, default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat

A

Cause of harm. Can be human or environmental etc

Internal (authorised)/External (unauthorised)/Partner (in between)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

White hat hackers

A

Ethical hackers or pen testers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Black hat hacker

A

Violate computer security for personal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Grey hat

A

In between white and black hat. Will look without owner permission and report the issue or publish it if the owner does not comply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Risk

A

Possibility that threats will exploit vulnerabilities of an asset and cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

models of Info Security: CIA

A

Overall security
- Confidentiality
- Integrity
- Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Models of information security: CAIN

A

Important for transport
- Confidentiality
- Authenticity (verified sender)
- Integrity
- Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Confidentiality

A

Need to ensure that info is disclosed only to those authorised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Privacy

A

Refers to individual desire to control data access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

6 example Threats to confidentiality
HSLMUI

A
  • Hackers
  • Shoulder Surfing
  • Lack of paper shredding
  • Malicious code
  • Unauthorised employee activity
  • Improper access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integrity

A

Making sure that information is correct and unmodified.

17
Q

Risks to integrity: Attack vectors

A

Phishing, website downloads, externally facing resources and infected attachments.

Malware inserted through these vectors can then corrupt data.

18
Q

Business Value in terms of data

A

What impact does this data have for the business etc

19
Q

Technical controls to protect data integrity

A
  • Email digital signatures
  • File integrity verifier utilities for operating systems
20
Q

Behavioural Controls to protect data integrity (think about users and duties)

A
  • Separation of duties
  • Rotation of duties
  • End user security training
21
Q

Availability

A

Ensure timely and reliable access.

Assurance that data is accessible when needed by those authorised.

22
Q

Ways to ensure availability

A
  • Maintenance
  • Redundancy
  • Backups
  • Cloud Computing
23
Q

Threats to availability

A

Disaster, hardware fail, human error, malice, loss of power, malicious code, loss of personnel.