week 9 Flashcards

1
Q

disclosure

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

alteration

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

denial

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s Cyber Security

A
  • The protection of information assets by addressing threats to
    information processed,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber Security Awareness

A

Cybersecurity addresses both internal and external threats to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk :

A

The likelihood that something bad will happen that causes harm to an informational asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asset:

A

Something that has tangible or intangible value that is worth protecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability :

A

A weakness that could be used to endanger or cause harm to an informational asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat :

A

A potential cause of an unwanted incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Residual risk:

A

Even after controls are in place, there will always be residual risk, defined as the remaining risk after management has implemented a risk response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Inherent risk:

A

The risk level or exposure without taking into account the actions that management has taken or might take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Third party risk :

A

Information sharing , restricted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Management

A

the process of identifying vulnerabilities and
threats to information resources, and deciding what
countermeasures to take to reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Security Implementation Approaches Compliance Based :

A

relying on industry standards, controls are
implemented disregard their applicability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Based :

A

Discover risks affecting organization and then design
appropriate security controls to address the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ad-hoc approach:

A

Implements Security with no relevant standard or
criteria

16
Q

How to measure risks

A

Risk tolerance
Size and scope of the environment
Amount of Data available

17
Q

Threat agents
Corporations:

A

breach security boundaries and perform malicious acts to gain a competitive advantage.

18
Q

Nation States

A

target government and private entities with a high level of sophistication to obtain intelligence or carry out other destructive activities.

19
Q

Hacktivists

A

hackers may target specific individuals or
organizations

20
Q

Cyberterrorists

A

use violence to achieve their goals, cyberterrorists frequently target critical infrastructures and government groups.

21
Q

Cybercriminals:

A

Motivated by the desire for profit,

22
Q

Cyber warriors

A

act on behalf of a political party or against another political party that threatens them.

23
Q

Script Kiddies

A

young individuals who are learning to hack

24
Q

Online Social Hackers

A

involved in cyberbullying, identity theft

25
Q

Employees

A

dissatisfied current or former employees represent
a clear cybersecurity risk.

26
Q

Attack:

A

the occurrence of a threat caused by threat agent to an asset.

27
Q

Attack vector:

A

is the path used to get access to the target (asset).

28
Q

Attack mechanism:

A

how to deliver an exploit.

29
Q

Attack process steps

A

Perform reconnaissance
Create attack tools
Deliver malicious capabilities
Exploit and compromise
Conduct an attack
Achieve results
Maintain a presence or set of capabilities
Coordinate a campaign

30
Q

malware

A

A software designed to gain access to targeted computer systems, steal information or disrupt computer operations

31
Q

Malware types

A

virus : replicate itself and spread from one computer to another
worm :replicate itself spread in computer network
trojan horse : hide within application
botnet : network of infected machines
spyware : gathers information
adware : show unwanted ads to users

32
Q

Ransomware

A

type of malware that locks your files or computer until you pay up