Cybersecurity Flashcards
(24 cards)
What are the reasons for a system attack? 1
- Fun/Challenge.
- Industrial espionage.
- Financial gain.
- Personal attack/revenge.
- Disruption.
- Data and information theft.
What are the main external threats to data security? 2
- Hacking/Malware.
- DOS attacks.
- Phishing/Pharming.
- Social engineering/Shoulder surfing.
- Man-in-the-middle attacks.
What are the main internal threats to data security? 3
- Untrustworthy sites/downloads.
- Unintended/Intended data discloure/leaking.
- Overriding of security.
- Portable storage.
What are the system impacts of a security breach? 4
- Data may not be recoverable.
- Future profits, finances may be affected.
- Digital system downtime.
What are the social/employee impacts of security breach? 5
- Damage to reputation.
- Reduced staff productivity.
- Legal action and fines against them.
What are the benefits and drawbacks of physical security measures? 6
\+Difficult to remove locks. \+Digital locks record user access. -Keys/cards can be lost or copied. -Expensive. -Portable devices cannot be protected this way.
What are the benefits and drawbacks of password security measures? 7
+Simple and cheap.
- Complex can be hard to remember.
- Do not protect from social engineering.
- Specialist software can deduce passwords.
What are the benefits and drawbacks of biometric security measures? 8
+No need to remember.
+Unique to the individual.
-Expensive.
-Can be spoofed.
What are the benefits and drawbacks of user access restrictions? 9
+Users can view without being allowed edits.
- Complex to set up and manage.
- Must be set to the correct level for everyone.
What are the benefits and drawbacks of 2FA? 10
+Higher security level.
+Only need to remember password.
-Required additional hardware and software.
What are the benefits and drawbacks of firewalls? 11
+Blocks malicious data.
+Easy to install, can be configured.
-Can be expensive and complex.
-Can block genuine traffic.
What are the benefits and drawbacks of password remembering software? 12
+Protects against shoulder surfing.
+No need to remember passwords.
+Speeds up logins.
-Stolen devices become a huge security risk.
What are the benefits and drawbacks of antivirus software? 13
+Protects well against known malware.
-Must be regularly updated for new signatures.
What are the benefits and drawbacks of device hardening? 14
+Protects from a range of attacks.
-Requires up to date skilled technical staff.
How can you harden a device? 15
- Restrict user access.
- Install firewall/security patches/antivirus.
- Remove old software and accounts.
- Use strong passwords, change default ones.
What should a backup procedure include? 16
- Weekly/Daily?
- Automatic/Manual?
- Physical backups should be in a fireproof box, offsite.
- Recovery procedure for reinstating backups.
What is encryption, what are its downsides? 17
- Sensitive data (files or whole disk) is scrambled.
- Data is lost if key is lost.
- Can be stolen if encryption is weak.
What are the types of hacker? 18
- Black hat commits crimes for their own good.
- Grey hat commits crimes but not for personal gain.
- White hats are endorsed by companies and hack for a living to find security weaknesses.
What are the benefits and drawbacks of pen testing? 19
\+Uses hacker methods, realistic insight. \+Vulnerabilities can be fixed. -Not always fully accurate. -Expensive. -Needs to be done regularly.
What is covered by company security policies? 20
- Internet/Email usage.
- External and personal devices.
- Passwords.
- Software.
- Backup/Hardening.
- Disposal of equipment/data.
What should a strong password policy advise? 21
\+Long passwords. \+Letters/Mixed cases/Symbols/Numbers. \+Change regularly. -Single word, especially names. -Write it down/share it.
What are the issues with installing non-approved software? How can software rules be enforced? 22
- Licensing issues/cost. Malware infection risk. IT support issues and incompatability.
- Prevent installation, deny admin rights, white list allowed software.
What types of disaster cause data loss? What should a disaster recovery policy cover? 23
- Cyberattack, data loss, equipment failure, natural disaster or terrorist attack.
- Back up process and frequency, where to operate from, recovery timeline.
What do you do after an attack? 24
- INVESTIGATE: Type/Severity.
- RESPOND: Inform stakeholders/authorities.
- MANAGE: Contain the attack.
- RECOVER: Disinfect and restore.
- ANALYSE: Identify source, modify procedures.