ch1 Flashcards

(22 cards)

1
Q

what’s cyber security

A

the protection of digital assets (data ,hardware ,software and network) by addressing possible threats that may result in unauthorized information disclosure, theft, or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Security

A
  • Fous : Protection of computer
  • Computer secure when the computer does what it is supposed to do and only what it is supposed to do
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Security

A
  • Focus: Protection of information, regardless of format, including:
  • Paper documents
  • Digital and intellectual property
  • Verbal or Visual communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common Threats To Security

A
  1. Viruses and worms
  2. Intruders
  3. Insiders
  4. Criminal organizations
  5. Terrorists and Information warfare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Viruses vs worm

A

viruses: need human action
worm: duplicate itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

is software that has a nefarious purpose, designed to cause
problems to you as an individual (for example, identity theft) or your
system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

two types of threats that fall under the
general heading of malware

A

Viruses and Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intruders

A
  • The act of deliberately accessing
    computer systems and networks without
    authorization is generally referred to as
    “hacking”.
  • Individuals who conduct this activity
    being referred to as “hackers”.
    (hacker outside the organization)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

explain why insiders are more dangerous in many respects than outside intruders

A

insiders have access and knowledge
necessary to cause immediate damage to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attacks by criminal organizations usually fall into the structured threat category, which is characterized by:

A
  • a greater amount of planning.
  • a longer period of time to conduct the activity.
  • more financial backing to accomplish it.
  • possibly corruption of, or collusion with, insiders.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information warfare

A

is warfare conducted against the information
and information processing equipment used by an adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

why Nation-States highly structured?

A

they have planning, resources and time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attributes of Actors/ Different ways to differentiate the threat actors:

A
  • by location (internal or external)
  • by level of sophistication
  • by level of resources or funding
  • by intent or motivation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A particular computer system is generally attacked for one of two
reasons:

A
  1. Specific Target: In this case, the attacker has chosen the target not
    because of the hardware or software the organization is running but for
    another reason—perhaps a political reason.
  2. Opportunistic Target: The attackers, in this case, are not targeting
    the organization; instead, they have learned of a vulnerability and are
    simply looking for an organization with this vulnerability that they can
    exploit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Three major considerations when securing a system:

A
  1. Correctness:
    - Ensuring that a system is fully up to date, with all patches installed and proper
    security controls in place.
  2. Isolation:
    - Protecting a system from unauthorized use, by means of access control and
    physical security.
  3. Obfuscation:
    - Making it difficult for an adversary to know when they have succeeded.
    Increasing the workload of an attacker makes it more difficult for them to
    succeed in their attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

steps of Cybersecurity Kill Chain to conduct attack

17
Q

Threat intelligence is broken down into three types, with different audiences and objectives for each:

A
  • Strategic
  • Broader trends typically meant for a non-technical audience
  • Tactical
  • Outlines of the tactics, techniques, and procedures of threat actors
    for a more technical audience
  • Operational
  • Technical details about specific attacks and campaigns
18
Q

Open-Source Intelligence (OSINT)/ public source

A

is the term used to describe the processes used in the
collection of threat intelligence information from public sources.

19
Q

example of open-source Intelligence (OSINT)

A

news articles, to blogs, to government reports

20
Q

Ethics

A

set of moral principles that guides an
individual’s or group’s behaviour.

21
Q

Threat intelligence is the basis of understanding adversary

A

Tactics, Techniques, and Procedures (TTPs).

22
Q

Recent Trends in Cybersecurity

A

1- Increased Accessibility: Shifting from closed environments to global access complicates security.
2- Evolving Threats: Attackers prioritize financial gain over seeking notoriety.