Introducing Cybersecurity History & Standards Flashcards

To understand the origins, evolution, and key frameworks of cybersecurity. This deck helps you memorize historical milestones, foundational terminology, and major security standards that shape the cybersecurity landscape today. (21 cards)

1
Q

What is the origin of the term “cybersecurity”?

A

It stems from “cybernetics,” used in the 1980s to describe protection of computing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What major event in the 1980s led to greater awareness of cybersecurity threats?

A

The Morris Worm incident in 1988.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does NIST stand for?

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the NIST Cybersecurity Framework?

A

To provide a standardized approach to managing cybersecurity risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 5 core functions of the NIST Cybersecurity Framework?

A

Identify, Protect, Detect, Respond, Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the CIA Triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you define hacking?

A

Hacking is the act of working within the confines of a system to produce unintended behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is malware short for?

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When did malware emerge?

A

Maleware emerged around 1983 during the public panic around The Cold War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What was the Morris Worm?

A

It was a significant malware that was developed in late 80’s and was originally created to map the size of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Script Kiddies?

A

Script Kiddies are individuals who download a piece of code and run it without having to write any code themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does APT stand for?

A

Advanced Persistent Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why are APTs important?

A

APTs are capable of running entire cyber-campaigns, attempting to infiltrate their target across multiple domains simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s Cybercrime?

A

It’s any crime that uses or targets a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the different types of cybercrime? How are they defined?

A

Extortion: Often in the form of ransomware
Fraud: This is a broad category & includes ID theft, scams retail fraud, phishing, etc.
Theft: Overall this is defined as stealing during a data breach, theft of services & resources, such as using other folks comps to mine cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s Digital Forensics?

A

It’s the process of gathering evidence of a cybercrime in a way that the evidence can be used in a court of law.

17
Q

What are the different types of Specializations? What do they each deal with?

A

Disk Forensics: Investigates storage media (i.e., hard drives)
Memory Forensics: Investigates the live memory on a digital device
Network Forensics: Investigates network traffic
Mobile Forensics: Investigates mobile devices
Cloud Forensics: Investigates cloud environments

18
Q

What’s the Computer Fraud & Abuse Act?

A

Is a law that’s used to prosecute cybercrime. Overall, the act makes it illegal to intentionally access a computer without authorization/to access a computer in a way that exceeds authorization that’s been granted.

19
Q

What cybercrimes does the Computer Fraud & Abuse Act prosecute?

A
  • Intrusion into networks & systems
  • Malware attacks
  • Theft of data & trade secrets
  • Denial of service attacks (need to look into this. Have 0 idea what this is)
20
Q

What are the different types of standard regulations for organizations?

A

HIPPA (Health Insurance Portability & Accountability Act)
GLBA (Gramm-Leach-Bliley Act)
PCI DSS (Payment Card Industry Data Security Standard)

21
Q

Explain each NIST Framework

A
  1. ID: ID & understand the threats & risks the org is likely to face
  2. Protect: Protect the org’s assets from those threats & risks
  3. Detect: Detect incidents (i.e., cyberattacks/other major events)
  4. Respond: Respond to incidents, preventing further damage
  5. Recover: Recover from incidents, evaluating how to prevent reoccurence cleaning up any damage that’s occurred