Bascs Flashcards

(49 cards)

1
Q

Where was organizational data typically stored 10 years ago?

A

A: On systems owned by and physically inside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where is organizational data stored now?

A

In the cloud, internet applications, personal computers, mobile devices, and third-party service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is cybersecurity important?

A

Because organizational systems are connected to the internet and vulnerable to attacks from malicious actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who are the malicious actors in cybersecurity?

A

Criminals, competitors, and sometimes other countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three ways malicious actors harm organizations?

A

Unauthorized access to confidential information.

Making information unavailable to the organization.

Tampering with an organization’s information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is cybersecurity?

A

The practice of protecting internet-connected organizations from malicious attacks and user accidents.

whether online or offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Does cybersecurity have an official definition?

A

No, but different organizations define it in various ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does US NIST stand for?

A

U.S. National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the US NIST define cybersecurity?

A

As protecting systems and data from malicious attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UK NCSC

A

UK National Cyber Security Centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the UK NCSC define cybersecurity?

A

As protecting systems from both malicious attacks and user-related security failures (intentional or accidental).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is information security

A

The discipline of protecting all of an organization’s data, including both digital and physical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is cybersecurity related to information security?

A

Cybersecurity is a subset of information security, which protects all organizational data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Do people use the terms cybersecurity and information security interchangeably?

A

Yes, even though cybersecurity is technically a subset of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are modern organizational systems different from older ones?

A

They are highly interconnected and spread across various platforms, including cloud services and third-party providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What role do third-party service providers play in cybersecurity?

A

They store and process organizational data, making them potential targets for cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is social engineering in cybersecurity?

A

Manipulating users into breaking security protocols, often by pretending to be a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How can users accidentally cause cybersecurity risks?

A

By failing to follow security procedures or being tricked into bypassing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the lifeblood of an organization?

A

Data, which needs to be available, accurate, and accessible only by the right people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the key terms in cybersecurity related to data protection?

A

Availability: Ensuring data is there when needed.
Integrity: Ensuring data is accurate and hasn’t been tampered with.
Confidentiality: Ensuring data is only accessed by the right people.

21
Q

What is an information asset in cybersecurity?

A

A set of data that holds value for an organization, such as customer purchase history.

22
Q

Where can information assets be found in a system?

A

They can be found in multiple systems, such as an accounting system, customer relationship management system, or a database.

23
Q

What does protecting information assets involve?

A

It involves protecting both the data and the systems that store, process, and transmit that data.

24
Q

What is a vulnerability in a computer system?

A

A weakness in a system that can be exploited by cyber attackers to make the system do what the attacker wants.

25
Can all computer systems have vulnerabilities?
Yes, all systems have vulnerabilities, ranging from simple ones to more complex ones that require significant effort to exploit.
26
Can vulnerabilities be found in different areas of a system?
Yes, vulnerabilities can exist in hardware, operating systems, applications, and even in people.
27
What is a malicious threat actor trying to do?
They aim to exploit vulnerabilities to gain unauthorized access to a system.
28
What are controls in cybersecurity?
Technical and procedural actions taken by an organization to defend against cyberattacks, such as buying software, hardware, services, or training.
29
Why are controls important in cybersecurity?
They help mitigate vulnerabilities, making it harder for attackers to succeed and ensuring that those who do succeed are detected quickly.
30
How does the probability of a cyberattack's success depend on system vulnerabilities?
It depends on the number and significance of the vulnerabilities in the system and the effectiveness of the controls in place to reduce the chance of a successful attack.
31
What is the ultimate goal of cybersecurity?
To protect the confidentiality, integrity, and availability of an organization's information assets from malicious actors.
32
What can happen if the confidentiality, integrity, or availability of an information asset is affected?
The organization could experience operational, financial, regulatory, or reputational impacts.
33
Why do some assets need more protection than others?
Because some assets are more valuable to the organization and more attractive to malicious actors, depending on the asset's value and the actor's intent.
34
What makes an asset more attractive to malicious actors?
The motives and intent of the attacker. For example, criminals often target financial systems or valuable information that can be monetized.
35
What are some examples of assets criminals might target?
Financial or money transfer systems Payment card data Management information that could affect share prices Confidential information that can be sold
36
What do competitors or other countries typically want to steal?
They are interested in stealing information for their own purposes, such as gaining a competitive advantage or national security benefits.
37
What is a cyber threat?
Any malicious actor who attempts to affect the confidentiality, integrity, or availability of an organization's information assets.
38
Why is understanding the motivation and intent of a malicious actor important?
It helps estimate the probability of an attack occurring and the potential impact it would have on the organization.
39
What is the purpose of a cyber risk assessment?
To identify which information assets are most at risk and prioritize protection efforts based on the likelihood of attack and potential damage.
40
Why would a defense contractor be more worried about another nation stealing its secrets than a criminal attacking its payment system?
Because stealing secrets would have a higher impact on the organization's operations and security than a financial attack.
41
How should an organization invest in cybersecurity?
By investing more in protecting information assets that malicious actors are most likely to target and that would cause significant harm if attacked.
42
What is the next step after identifying a threat actor’s interest in assets?
We need to understand how vulnerable our systems and information assets are to attack and assess how likely it is that an attack would succeed.
43
What are the three main ways attackers gain unauthorized access to a system?
Exploiting a misconfiguration. Taking advantage of software vulnerabilities. Using the username and password of a real, authorized user.
44
What is a denial-of-service (DoS) attack?
An attack where the attacker overloads the system with requests, making it unavailable to legitimate users. It can also be a precursor to extorting money.
45
Can denial-of-service attacks happen without accessing the system?
Yes, attackers can overload the system by making numerous simultaneous legitimate requests.
46
Where can attackers launch an attack on a system?
From systems the organization exposes on the internet. From inside the organization's network, typically by tricking the system into executing a malicious program.
47
How do attackers trick a system or user into running malicious software?
They use tactics like sending infected email attachments, phishing links, or tricking users into revealing credentials on fraudulent websites.
48
What is phishing in cybersecurity?
A technique where attackers trick users into divulging their credentials or running malicious programs through deceptive emails or websites.
49
For an attacker to succeed, what must be vulnerable in an organization?
The organization's systems, software, or people must have vulnerabilities that can be exploited by the attacker.