Bascs Flashcards
(49 cards)
Where was organizational data typically stored 10 years ago?
A: On systems owned by and physically inside the organization.
Where is organizational data stored now?
In the cloud, internet applications, personal computers, mobile devices, and third-party service providers.
Why is cybersecurity important?
Because organizational systems are connected to the internet and vulnerable to attacks from malicious actors.
Who are the malicious actors in cybersecurity?
Criminals, competitors, and sometimes other countries.
What are the three ways malicious actors harm organizations?
Unauthorized access to confidential information.
Making information unavailable to the organization.
Tampering with an organization’s information.
What is cybersecurity?
The practice of protecting internet-connected organizations from malicious attacks and user accidents.
whether online or offline.
Does cybersecurity have an official definition?
No, but different organizations define it in various ways.
What does US NIST stand for?
U.S. National Institute of Standards and Technology
How does the US NIST define cybersecurity?
As protecting systems and data from malicious attacks.
UK NCSC
UK National Cyber Security Centre
How does the UK NCSC define cybersecurity?
As protecting systems from both malicious attacks and user-related security failures (intentional or accidental).
What is information security
The discipline of protecting all of an organization’s data, including both digital and physical information.
How is cybersecurity related to information security?
Cybersecurity is a subset of information security, which protects all organizational data.
Do people use the terms cybersecurity and information security interchangeably?
Yes, even though cybersecurity is technically a subset of information security.
How are modern organizational systems different from older ones?
They are highly interconnected and spread across various platforms, including cloud services and third-party providers.
What role do third-party service providers play in cybersecurity?
They store and process organizational data, making them potential targets for cyber threats.
What is social engineering in cybersecurity?
Manipulating users into breaking security protocols, often by pretending to be a trusted source.
How can users accidentally cause cybersecurity risks?
By failing to follow security procedures or being tricked into bypassing them.
What is the lifeblood of an organization?
Data, which needs to be available, accurate, and accessible only by the right people.
What are the key terms in cybersecurity related to data protection?
Availability: Ensuring data is there when needed.
Integrity: Ensuring data is accurate and hasn’t been tampered with.
Confidentiality: Ensuring data is only accessed by the right people.
What is an information asset in cybersecurity?
A set of data that holds value for an organization, such as customer purchase history.
Where can information assets be found in a system?
They can be found in multiple systems, such as an accounting system, customer relationship management system, or a database.
What does protecting information assets involve?
It involves protecting both the data and the systems that store, process, and transmit that data.
What is a vulnerability in a computer system?
A weakness in a system that can be exploited by cyber attackers to make the system do what the attacker wants.