Chapter 1 Risk Management Flashcards
What is a big part of the discussion when it comes to cybersecurity today?
Business risk.
What are the foundational concepts of cybersecurity?
Assets, threats, threat actors, vulnerabilities, and the CIA triad (Confidentiality, Integrity, Availability).
What are assets in cybersecurity?
Personal information, photos, bank information, and other valuable data we want to keep secure.
What represents a threat in the analogy of cybersecurity?
A pirate sneaking up to steal the golden coins.
How is risk defined in cybersecurity terms?
The potential for a threat to exploit a vulnerability and cause harm to assets.
What is the essence of cybersecurity?
Understanding and protecting assets, recognizing risks, addressing vulnerabilities, and minimizing risks.
What is the CIA triad in cybersecurity?
Confidentiality, Integrity, and Availability.
What does confidentiality ensure in cybersecurity?
Data is only accessible to those who have the authority to view it.
What can unauthorized access lead to in terms of confidentiality?
Data breaches with legal and reputational consequences.
What does integrity ensure in cybersecurity?
Data remains unaltered and genuine.
Why is integrity important in a banking system?
It ensures that the amount deducted from one account matches the amount added to another, preventing mistrust and financial loss.
What does availability ensure in cybersecurity?
Systems, applications, and data are available and operational when needed.
Why is availability crucial in a hospital setting?
The database of patients must be available, especially during emergencies, to prevent financial losses, hindered operations, or endangering lives.
What is the role of the CIA triad in dealing with cybersecurity threats?
It serves as a trusted shield to address and manage threats effectively.
What are threat actors in cybersecurity?
Individuals or groups that pose a threat to digital assets, such as unskilled hackers, hacktivists, insider threats, and shadow IT.
What factors determine the threat level of a threat actor?
Resources, funding, sophistication, and capability.
How are threat actors categorized based on their relation to a company?
Internal or external to the company.
Describe unskilled hackers in the treasure chest analogy.
Rookie pirates in rickety boats using basic maps and readily available hacking tools.
What are the characteristics of unskilled hackers?
External, low resources, low funding, low sophistication, low capability.
Who are hacktivists in the context of cybersecurity?
Pirates that hack to promote a political or social agenda, akin to pirates trying to overthrow a tyrant.
What are the characteristics of hacktivists?
External, low resources, low funding, low sophistication, low capability.
What makes insider threats particularly dangerous?
They are part of the company’s trusted crew with intimate knowledge of the company’s secrets.
What are the characteristics of insider threats?
Internal, high resources (company’s resources), low funding, variable sophistication, high capability.
What is shadow IT in companies?
Unauthorized apps or services used by employees, creating vulnerabilities inadvertently.