Cyber Secuirty Flashcards

1
Q

What is Cyber Security?

A

The practice of protecting digital systems, networks, programs and humans from digital attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is meant by the CIA triangle?

A
  • Confidentiality: keeping data secret
  • Integrity: keeping data in-tact/unchanged
  • Availability: keeping data available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 Security threats?

A
  1. Disclosure
  2. Deception
  3. Disruption
  4. Unsurpation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Security principles?

A
  • Security relies on evaluation of risk
  • Choose what risks are worth preventing
  • Good security considers: people involved, processes used, the technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by Security trade-off?

A

Cost of the security measure vs the time and effort to break it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 4 areas of Security?

A
  1. Preventive
  2. Detective
  3. Reactive
  4. Reconstructive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Access Control?

A
  • Data security process that enables organisations to manage who is authorised to access corporate data and resources
  • Control models: hierarchical
  • Compartmental
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 2 types of Access Control?

A
  • Access Control List (ACL)
  • Discretionary Access Control (DAC)
  • Role-Based Access Control (RBAC)
  • Mandatory Access Control (MAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some Access Control issues?

A
  • Can make it very difficult to prevent access when dealing with large groups of people
  • Authentication creep – moving departments but old privileges aren’t revoked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 2 ways of improving Identification and Authentication?

A
  • Requiring regular password changes
  • 2 Factor Authentication (2FA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Cryptography and what are the requirements?

A

Encoding messages so they can only be understood by their intended recipient
- The plain text
- A key
- An encryption function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 2 types of keys that can be used?

A
  • Symmetric: same key is used to encrypt and decrypt the data
  • Asymmetric: public key to encrypt the data, private key to decrypt the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some issues surrounding Encryption?

A
  • Implementing good encryption can be difficult: the more secure the encryption, the higher the resource, cost and time
  • Encryption itself is often seen as a political and privacy issue
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 5 types of attacks?

A
  1. Malware/Malware propagation
  2. Denial of Service attacks
  3. Man-in-the-Middle attacks
  4. Web-based attacks
  5. Physical security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is IoT?

A

Internet of Things refers to computing devices embedded in everyday objects, that can send and receive data via the internet
- Home networks
- Wearable devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is meant by MGC Security?

A
  • Embedded devices
  • Gateway
  • Cloud systems
17
Q

What are the 2 key areas in IoT Security?

A
  • Data Security
  • System Security
17
Q

What is meant by Data Security?

A

Keeping the data collected and processed by IoT devices safe and private
- Home occupancy information
- Medical information
- Location information

18
Q

What is meant by System Security?

A

Keeping the devices themselves safe from hacking, must be adequate on every device
- Encryption
- Authentication procedures
- Safe architecture

19
Q

What are some difficulties with IoT Security?

A
  • Cheap hardware
  • Unique architecture, making support difficult
  • Lack of update procedure
  • Many different access methods, leading to vulnerable entry points
20
Q

What are some IoT solutions?

A
  • Develop legislation and common standards
  • Security makes economic sense
  • Improve technologies
21
Q

What is meant by Dataset Poisoning?

A

Where training data is compromised with intentional malicious information

22
Q

What are some ways that AI Systems can be protected?

A
  • Air-gapped Pocket LLMs
  • Tight control on the data in datasets
  • Data sanitisation
  • Have human checkers of the responses