Intro to Cybersecurity Chapter 1 Flashcards
(35 cards)
What is Cybersecurity?
The ongoing effort to protect these networked systems and all of the data from unauthorized use or harm
What is Cybersecurity in the personal realm?
The need to safeguard your identity, your data, and your computing devices.
What is Cybersecurity at the corporate level?
It is everyone’s responsibility to protect the organization’s reputation, data, and customers
What is Cybersecurity at the state level?
The national security, and the safety and well-being of the citizens are at stake.
What is your offline identity?
It is the person who your friends and family interact with on a daily basis at home, at school, or work.
What is your online identity?
Online identity is who you are in cyberspace, how you present yourself to others online
What 7 aspects of personal data?
- Data on computing devices
- Medical Data
- Employment
- Information online
- Your identity
- Education Data
- Financial Data
What is personal data?
Personal information can uniquely identify you as an individual.
What areas encompass personal data?
Pictures, messages, name, ocial security number, date and place of birth, and mother‘s maiden name.
What are personal medical records?
electronic health records (EHRs) and fitness bands
What are are education records?
Information about your grades and test scores, your attendance, courses taken, awards and degrees rewarded, and any disciplinary reports. (This record may also include contact information, health and immunization records, and special education records including individualized education programs (IEPs).)
What are Employment and Financial Records
Information about your income and expenditures.
What are the two types of organization data?
Traditional Data and Internet of Things and Big data.
What does corporate traditional data comprise of?
Personnel information, intellectual properties, and financial data.
What does IoT data comprise of?
IoT is a large network of physical objects, such as sensors and equipment that extend beyond the traditional computer network.
What is the CIA triad?
Confidentiality, Integrity, Availability
Define confidentiality.
Another term for confidentiality would be privacy. Policies should restrict access to the information to authorized personnel and ensure that only those authorized individuals view this data.
Define Integrity.
Integrity is accuracy, consistency, and trustworthiness of the data during its entire life cycle.
What are some Hash/Checksums?
MD5, SHA-1, SHA-256, and SHA-512.
Why are hash/checksums used?
A checksum is used to verify the integrity of files, or strings of characters, after they have been transferred from one device to another across your local network or the Internet.
What is availability?
Maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups ensure the availability of the network and data to the authorized users.
What are the consequences of a Security Breach?
- Ruined Reputation
- Vandalism
- Theft
- Revenue Lost
Damaged Intellectual Property
What are three broad categories of hackers?
White, Grey, and Black
What are White Hat Hackers?
These are ethical hackers who use their programming skills for good, ethical, and legal purposes.