Week 1 (Introduction to Cybersecurity) Flashcards

1
Q

What is Cybersecurity?

A

Security of information systems and networks (cyberspace) in the face of attacks, accidents, and failures, with the goal of protecting operations and assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the CIA Triad?

A

Confidentiality, Integrity and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Confidentiality and how is it violated?

A

Confidentiality is that certain information should only be known by certain people, and those who are unauthorized are actively prevented from obtaining access.
It is violated intentionally through direct attacks or unintentionally through human error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Integrity and how is it violated?

A

Integrity is that the data is stored and transferred as intended and any modification is authorized. It is ensuring that data has not been tampered with and therefore can be trusted. Integrity means that the data is correct, authentic, and reliable.
It is violated directly via an attack vector, or unintentionally through human error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an attack vector?

A

It is the path that a hacker takes to exploit cybersecurity vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Availability and how is it violated?

A

Availability is that the information is accessible to those authorized to view or modify it. It means that networks and applications are up and running, and the authorized users have timely, reliable access to resources when they are needed.
It is violated through hardware or software failures, power failures, natural disasters, or human errors. It is also violated through attacks, the most common of which are denial-of-service (DoS) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Seven Security Domains in Information Security?
Give a paragraph linking all seven.

A

Organization, End-Users, Physical access, System, Software, Network, Data
In every organization, there are people. People have physical access to computer systems. In the system, there is software. The software makes the system communicate with one another over the network. in the network, you find data flowing from one end to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three types of assets in an organization?

A

Tangible assets, Intangible assets, and Employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Vulnerability, Threat, and Risk.

A

A Vulnerability is a weakness that could be triggered accidentally or exploited intentionally to cause a security breach.
A Threat is the potential for something or someone that may trigger a vulnerability accidentally or exploit it intentionally to ‘exercise’ a vulnerability.
A Risk is the likelihood and impact (or consequence) of a threat actor exploiting a vulnerability.
FOR THIS CONTEXT: threat (attacker of vulnerability), asset (Valued resource) and vulnerability (Exploitable weakness) must all be present to have a risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a threat actor?

A

An entity that is partially or wholly responsible for an incident that impacts - or has the potential to impact - an organization’s security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give 5 examples of threat actors.

A

Hackers/Hacktivists, Nation States, Cyberterrorists, Organized Crime, Trusted Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Hackers/Hacktivists?

A

Hacker and attacker are related terms for individuals who have the skills to gain access to computer systems through unauthorized or unapproved means.
Hacktivists use cyber weapons to promote a political agenda - or for publicity - and they target anything and everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Nation States as threat actors?

A

Nation States use cyber weapons to achieve both military and commercial (Economic) goals. They attack IP or infrastructure.
Advanced Persistent Threat (APT) is a stealthy threat actor that is typically nation-state or state-sponsored which gains unauthorized access to a computer network and remains undetected for an extended period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Cyberterrorism?

A

Cyberterrorism can be defined as the intentional use of computers, networks, and public internet to cause destruction and harm for personal objectives.
Often to cause support, and they target highly visible targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Organized Crime?

A

They seek any opportunity for criminal profit. Typical activity is financial fraud and blackmail. Often attack IP, Banks or PoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Trusted Insiders?

A

In most cases, trusted insiders operate externally from the networks they target. They are a member or ex-member of, or somehow affiliated with the organizations own staff, partners or contractors.
They are also often more difficult to identify and block.
Motives are often revenge or financial gain and they target data and/or networks.