IAS102 Flashcards

(42 cards)

1
Q

INCLUDES HIGHLY SPECIALIZED REVIEW AND EVALUATION OF INCOMING CYBERSECURITY INFORMATION TO DETERMINE IF IT IS USEFUL FOR INTELLIGENCE.

A

ANALYZE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

THIS GROUP OF CRIMINALS BREAKS INTO COMPUTERS OR NETWORKS TO GAIN ACCESS FOR VARIOUS REASONS.

A

HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TEENAGERS OR HOBBYISTS MOSTLY LIMITED TO PRANKS AND VANDALISM, HAVE LITTLE OR NO SKILL, OFTEN USING EXISTING TOOLS OR INSTRUCTIONS FOUND ON THE INTERNET TO LAUNCH ATTACKS.

A

SCRIPT KIDDIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

INVOLVE IDENTIFYING, ASSESSING AND CONTROLLING RISKS TO AN ORGANIZATIONS CAPITAL, EARNINGS, AND CRITICAL ASSETS

A

SECURITY AND RISK MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

REFERS TO PROTECTING INFORMATION FROM UNAUTHORIZED ACCESS

A

CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ALIGN SECURITY EFFORTS WITH THE OVERALL BUSINESS STRATEGY.

A

STRATEGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ENSURE COMPLIANCE WITH RELEVANT REGULATIONS, STANDARDS AND POLICIES

A

CONFORMANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A SELF-CONTAINED PROGRAM THAT REPLICATES ITSELF AND SPREADS ITS COPIES TO OTHER COMPUTERS.

A

WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TYPE OF Cyber attack THAT USES EMAIL, SMS, PHONE, SOCIAL MEDIA, SOCIAL ENGINEERING TECHNIQUES TO ENTICE A VICTIM TO SHARE SENSITIVE INFORMATION- SUCH AS PASSWORDS OR ACCOUNT NUMBERS.

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A TECHNIQUE THROUGH WHICH A CYBER CRIMINAL DISGUISES THEMSELVES AS A KNOWN OR TRUSTED SOURCE

A

SPOOFING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

POSSESS THE INSIGHT TO RECOGNIZE THE INFLUENCE OF DATA AND HARNESS THAT POWER TO BUILD GREAT ORGANIZATIONS, PROVIDE SERVICES AND PROTECT PEOPLE FROM CYBER ATTACKS.

A

CYBERSECURITY SPECIALISTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GREY HAT HACKERS WHO ATTEMPT TO DISCOVER EXPLOITS AND REPORT THEM TO VENDORS, SOMETIMES FOR PRIZES OR REWARDS.

A

VULNERABILITY BROKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DEPENDING ON A PERSON’S PERSPECTIVE, THESE ARE EITHER WHITE HAT OR BLACK HAT HACKERS WHO STEAL GOVERNMENT SECRETS, GATHER INTELLIGENCE, AND SABOTAGE NETWORKS.

A

STATE SPONSORED HACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATTACKERS BREAK INTO NETWORKS OR COMPUTER SYSTEMS TO DISCOVER WEAKNESSES IN ORDER TO IMPROVE THE SECURITY OF THESE SYSTEMS

A

WHITE HAT ATTACKERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

THE RESULT OF DATA SETS THAT ARE LARGE AND COMPLEX, MAKING TRADITIONAL DATA PROCESSING APPLICATIONS INADEQUATE

A

IMPACT OF BIG DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MEANS DATA ARE TRUSTWORTHY, COMPLETE AND HAVE NOT BEEN ACCIDENTALLY ALTERED OR MODIFIED BY AN UNAUTHORIZED USER.

A

INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MEANS DATA ARE ACCESSIBLE WHEN YOU NEED THEM

18
Q

CATEGORIES OF CYBERSECURITY WORK

A

1) OPERATE AND MAINTAIN
2) PROTECT AND DEFEND
3) INVESTIGATE
4) COLLECT AND OPERATE
5) ANALYZE
6) OVERSIGHT AND DEVELOPMENT
7) SECURELY PROVISION

19
Q

SECURITY GOVERNANCE KEY PRINCIPLES

A

1) RESPONSIBILITY
2) STRATEGY
3) ACQUISITION
4) PERFORMANCE
5) CONFORMANCE
6) HUMAN BEHAVIOR

20
Q

A PROCESS USED IN INFORMATION SECURITY TO CATEGORIZE DATA BASED ON ITS LEVEL OF SENSITIVITY AND IMPORTANCE

A

INFORMATION CLASSIFICATION

21
Q

INVOLVES RESPONSIBILITY FOR THE MAINTENANCE, OPERATIONS, AND SECURITY OF A SPECIFIC IT SYSTEM.

A

SYSTEM OWNERSHIP

22
Q

WHEN DATA OWNERSHIP IS CLEARLY ASSIGNED, THE DESIGNATED OWNER TAKES RESPONSIBILITY FOR MAINTAINING DATA ACCURACY, COMPLETENESS AND CONSISTENCY.

A

DATA QUALITY AND INTEGRITY

23
Q

IN MANDATES STRICT CONSENT REQUIREMENTS AND GIVES INDIVIDUALS THE RIGHT TO ACCESS AND DELETE THEIR DATA

A

GENERAL DATA PROTECTION REGULATION (GDRP)

24
Q

COMPANIES MAY USE PERSONAL DATA FOR PURPOSES BEYOND WHAT USERS CONSENTED TO, SUCH AS TARGETED ADVERTISING OR SELLING DATA TO THIRD PARTIES.

25
UNAUTHORIZED ACCESS TO PERSONAL DATA CAN LEAD TO IDENTIFY THEFT, FINANCIAL LOSS, AND PRIVACY VIOLATIONS
DATA BREACHES
26
GOVERNMENTS AND ORGANIZATIONS MAY MONITOR INDIVIDUALS ACTIVITIES, RAISING CONCERNS ABOUT PRIVACY AND CIVIL LIBERTIES
SURVEILLANCE
27
REFERS TO THE DESIGNATION OF AUTHORITY OVER SPECIFIC SETS OF DATA.
OWNERSHIP
28
THIS MAY SEEM EASY, BUT WHEN WE TALK ABOUT INFORMATION IN HIGH VOLUME, VARIETY AND IMPORTANCE, CARRYING OUT THIS TASK BECOMES A LOT MORE COMPLEX.
CLASSIFIED INFORMATION
29
ENSURES THE SYSTEM RUNS SMOOTHLY, IS UPDATED REGULARLY AND IS PROTECTED AGAINST SECURITY THREATS.
SYSTEM OWNER
30
THIS LAW GIVES California RESIDENTS THE RIGHT TO KNOW WHAT PERSONAL DATA IS BEING COLLECTED ABOUT THEM, TO WHOM IT IS BEING SOLD, AND THE ABILITY TO ACCESS AND DELETE THEIR DATA
CALIFORNIA CONSUMER PRIVACY ACT (CCPA)
31
DATA OWNERS CAN MONITOR DATA USAGE, IMPLEMENT NECESSARY SECURITY MEASURES, AND ENSURE COMPLIANCE WITH LEGAL OBLIGATIONS, MITIGATING RISKS ASSOCIATED WITH DATA BREACHES AND NON-COMPLIANCE
COMPLIANCE AND REGULATORY REQUIREMENTS
32
IN 2024, WHO ISSUED AN EXECUTIVE ORDER TO PROTECT AMERICAN'S SENSITIVE PERSONAL DATA FROM EXPLOITATION BY COUNTRIES OF CONCERN
PRESIDENT BRIDEN
33
INFORMATION THAT IS EXTREMELY SENSITIVE AND REQUIRES THE HIGHEST LEVEL OF PROTECTION AND SHOULD ONLY BE SHARED WITH A SELECT GROUP OF AUTHORIZED INDIVIDUALS
SECRET
34
THIS SYSTEM CAN USE NUMERIC OR ALPHABETIC ORDER, AS LONG AS ITS EASY TO UNDERSTAND AND FOLLOW
LABELING SYSTEM
35
INFORMATION THAT IS NOT SENSITIVE AND CAN BE SHARED FREELY WITH ANYONE
PUBLIC
36
INFORMATION THAT IF DISCLOSED WOULD CAUSE EXCEPTIONALLY GRAVE DAMAGE TO THE NATIONAL SECURITY AND ACCESS TO THIS INFORMATION IS RESTRICTED TO A VERY SMALL NUMBER OF AUTHORIZED INDIVIDUALS WITH A NEED-TO-KNOW.
TOP SECRET
37
IT ESTABLISHES ROLES, RESPONSIBILITIES, AND DECISION-MAKING AUTHORITY, ENABLING ORGANIZATIONS TO DEFINE AND ENFORCE DATA-RELATED POLICIES, STANDARDS, AND PROCESSES
DATA GOVERNANCE FRAMEWORK
38
INFORMATION THAT HAS RESTRICTED ACCESS AS PER LAW OR REGULATIONS
CLASSIFIED INFORMATION
39
INFORMATION THAT IS SENSITIVE BUT NOT CRITICAL, AND SHOULD ONLY BE SHARED WITHIN THE ORGANIZATION
INTERNAL
40
PROTECTS SENSITIVE HEALTH INFORMATION FROM BEING DISCLOSED WITHOUT THE PATIENTS CONSENT OR KNOWLEDGE
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
41
MEASURES TO PROTECT PERSONAL DATA
1) ENCRYPTION 2) ACCESS CONTROL 3) REGULAR AUDITS 4) USER EDUCATION
42
ASSIGNING VALUE TO THE INFORMATION ASSETS
1) PUBLIC INFORMATION 2) INTERNAL INFORMATION 3) RESTRICTED INFORMATION 4) CLASSIFIED INFORMATION 5) CONFIDENTIAL INFORMATION