CyberS C1 Flashcards

1
Q

What is Cybersecurity?

A

Cybersecurity is the practice of protecting computer systems, networks, and data from digital threats, attacks, and unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the responsibilities of businesses in the cybersecurity world regarding data?

A

Businesses in the cybersecurity world have the responsibility to collect and harness the power of data and analytics. They must protect this data from misuse and unauthorized access to ensure the growth of data creates opportunities for cybersecurity specialists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What risks are associated with the growth of data collection and analytics in the cybersecurity domain?

A

The growth in data collection and analytics poses risks to individuals and modern life if precautions are not taken to protect sensitive data from criminals or others with harmful intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Differentiate between white hat, gray hat, and black hat attackers

A

White hat attackers break into networks to improve security, gray hat attackers may report vulnerabilities Matching with their agenda, while black hat attackers violate security for personal gain or malicious reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the motives of script kiddies, vulnerability brokers, and hacktivists in the realm of cybersecurity?

A

Script kiddies, often teenagers or hobbyists with limited skills, engage in pranks and vandalism. Vulnerability brokers are grey hat hackers discovering exploits for rewards, and hacktivists protest against political or social ideas through various means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provide examples of different types of cyber criminals and their motives

A

Cyber criminals come in various forms, such as script kiddies engaging in pranks, vulnerability brokers seeking exploits, hacktivists protesting against organizations, and state-sponsored hackers involved in espionage and sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What factors contribute to the spread and growth of cybercrime?

A

Spread || unproctected data and a lack of CyberS meassures

Growth || a growth a tech incing attack surfaces and a connectivity and dependence of Digital sys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Analyze the efforts committed to expanding the cybersecurity workforce

A

Organizations and efforts are dedicated to expanding the cybersecurity workforce, reflecting the recognition of the importance of skilled professionals in addressing the challenges in the cybersecurity domain

organization and efforts reflect the recognition of the importance of skilled professionals in addressing the challenges in the CyberS domian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provide examples of Information Security Management Standards

A

Information Security Management (ISM) Standards, such as ISO 27000, offer a framework for implementing cybersecurity measures within organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do new laws contribute to cybersecurity efforts, and can you name a few examples?

A

New laws, tracked by groups like ISACA, address cybersecurity, ranging from individual privacy to the protection of intellectual property. Examples include the Cybersecurity Act, Federal Exchange Data Breach Notification Act, and the Data Accountability and Trust Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the term “cyber vulnerability’’

A

A cyber vulnerability is a weakness that makes a target vulnerable to an attack in the cybersecurity domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List some examples of data sources that can be targeted by cyber criminals

A

Examples include personal information, medical records, education records, employment, and financial records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the threats associated with network services like DNS, HTTP, and online databases

A

Cyber criminals often target network services like DNS and use packet-sniffing tools to capture data streams. Rogue devices, such as unsecured Wi-Fi access points, and packet forgery are common techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Differentiate between internal and external security threats

A

Internal security threats originate from within an organization, potentially causing greater damage due to direct access and insider knowledge. External threats, from amateurs or skilled attackers, exploit vulnerabilities or use social engineering to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What challenges do mobile devices pose in terms of cybersecurity, and why is Bring Your Own Device (BYOD) a growing trend?

A

Mobile devices, including BYOD, pose challenges in central management and updates, becoming a growing threat as more people use them to access enterprise information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the emergence of the Internet of Things (IoT) impact cybersecurity efforts?

A

The IoT, connecting billions of devices to the Internet, increases the amount of data needing protection. Users accessing devices remotely and the expanded storage capacity through the Cloud lead to exponential growth, requiring enhanced cybersecurity measures

17
Q

How does the National Institute of Standards and Technologies (NIST) address the shortage of cybersecurity specialists in the U.S.?

A

NIST created a framework that helps companies and organizations identify major responsibilities, job titles, and workforce skills needed for cybersecurity professionals. The framework categorizes cybersecurity work into seven categories, covering areas such as operation, maintenance, protection, investigation, collection, analysis, oversight, and development.

18
Q

What are the seven categories of cybersecurity work within the Workforce Framework?

A
  1. Operate and Maintain
  2. Protect and Defend
  3. Investigate
  4. Collect and Operate
  5. Analyze
  6. Oversight and Development
  7. Securely Provision
19
Q

How can individuals build and practice the skills necessary to become cybersecurity specialists?

A

Individuals can participate in online cybersecurity communities, collaborate with professional colleagues, join cybersecurity student organizations, and take part in cybersecurity skills competitions

20
Q

What are the benefits of participating in online cybersecurity communities?

A

Cybersecurity specialists can collaborate with professional colleagues, explore resources, and stay updated on industry trends through international technology organizations’ sponsored workshops and conferences

21
Q

Name two cybersecurity certifications and briefly describe their focus

A

(ISC)^2 Certified Information Systems Security Professional (CISSP): Suitable for cybersecurity specialists with technical and managerial experience, globally recognized, and approved by the U.S. Department of Defense.

  1. ISACA Certified Information Security Manager (CISM): For cybersecurity specialists responsible for managing, developing, and overseeing information security systems at the enterprise level.

CISSP: Globally recognized certification for cybersecurity specialists with technical and managerial experience, approved by the U.S. Department of Defense.

CISM: Ideal for cybersecurity specialists overseeing and managing enterprise-level information security systems.

22
Q

What are the different types of Tools for Thwarting crimes

A

Vulnerability DataBases - CVE (Public DB of all known vulnerabilities)

Earley waring Sys - HoneyNet Project (Project providing a honeymap which displays real-time visualization pof attacks)

Shared Cyber Intelligence - InfraGard (Partnership between FBI and Private sectors)

ISM standrads - ISO 27000 (Framework implementing cybers messures)

New Laws - ISACA (provides laws to safdeguard data such laws as Cyber Act Law )