midterm 2 Flashcards
What is the G7 24/7 Cybercrime Network?
๐น A network for international cooperation in investigating and prosecuting high-tech crimes.
๐น Provides 24/7 contact points for cybercrime incidents.
๐น Facilitates freezing and production requests for digital evidence.
What is the ITU (International Telecommunication Union)?
๐น Established in 1865 to manage global communication networks.
๐น Sectors: Radiocommunications, Standardization, and Development.
๐น Operates the ITU Cybersecurity Programme to enhance global cyber resilience.
What is the role of the United Nations in cybersecurity?
/UN Internet Governance Forum โ Discusses global internet policies.
/UN Group of Governmental Experts (GGE) โ Addresses international cybersecurity issues.
/Cyber Defence Committee (NATO collaboration) โ Strengthens cybersecurity policies.
What cybersecurity policies does the OECD support?
/Digital security legal instruments developed since the 1990s.
//Key recommendations:
//Cryptography Policy (1997)
//Digital Security Risk Management (2015)
//Security of Critical Activities (2019)
What is the Budapest Convention on Cybercrime
/Adopted in 2001, aims to harmonize cybercrime laws across countries. /Promotes international cooperation for cybercrime investigations.
/Sets legal standards for criminal procedures and digital evidence handling.
What is the Global Cybersecurity Index (GCI)?
/Measures cybersecurity preparedness across nations.
/Assessment based on Legal, Technical, Organizational, Capacity Building, and Cooperation measures.
What is the African Unionโs approach to cybersecurity?
/African Union Convention on Cybersecurity and Personal Data Protection.
/Establishes legal and regulatory frameworks for data protection and cybercrime.
What are National Cybersecurity Strategies?
/Key areas include:
/Governance
/Risk management
/Critical infrastructure protection
/nternational cooperation
What are the legal solutions for cybersecurity?
/Criminalization โ Defining cybercrime laws.
/Incident reporting & information sharing โ Ensuring response coordination.
/Institutional arrangements โ Creating dedicated cybersecurity agencies.
What is the Global Cybersecurity Index (GCI)?
/A global ranking system that measures countriesโ cybersecurity preparedness.
/Developed by the International Telecommunication Union (ITU).
/Evaluates legal, technical, and organizational measures in cybersecurity.
What are the Five GCI Assessment Pillars?
/Legal Measures โ Laws and regulations on cybersecurity and cybercrime.
/Technical Measures โ National CSIRTs, cybersecurity standards, and risk management.
/Organizational Measures โ Cyber strategies, policies, and coordination.
/Capacity Building โ Cybersecurity education, training, and awareness.
/Cooperation โ International partnerships and incident response collaboration.
Why is the GCI important?
/Helps countries identify strengths & weaknesses in cybersecurity.
/Encourages international cooperation in fighting cyber threats.
/Provides benchmarking data for governments to improve security policies.
What does a high GCI score indicate?
/A country has strong legal, technical, and organizational cybersecurity frameworks.
/It actively trains personnel, promotes awareness, and engages in international collaboration.
/Examples of high-ranking countries: U.S., U.K., Singapore, Estonia.
How can countries improve their GCI ranking?
/Strengthen cybercrime laws and enforcement.
/Develop national cybersecurity strategies.
/Create and fund CSIRTs (Computer Security Incident Response Teams).
/Enhance international cooperation in cybersecurity.
What was the biggest shift in cyberthreats observed in 2023?
A surge in attacks targeting identities, focusing on logging in rather than hacking in.
What technique saw a 100% increase in 2023 for compromising identities?
A type of malware designed to steal credentials and sensitive data.
What cyberattack method saw a drop despite remaining common?
Ransomware attacks on enterprises.
What was the most common impact of cyberattacks in 2023?
Data theft and leaks.
How are attackers acquiring credentials on the dark web?
Through infostealer malware that collects and sells login data.
What is adversary-in-the-middle (AitM) phishing?
A method where attackers intercept traffic between a user and a website to steal credentials and bypass MFA.
Why is identity abuse becoming a preferred attack vector?
Itโs harder for defenders to distinguish between legitimate and malicious identity use.
What were the top two initial access vectors in 2023?
Valid accounts (30%) and phishing (30%).
How are attackers obtaining valid credentials?
Through infostealers, phishing, and dark web marketplaces.
What percentage of cloud assets for sale on the dark web are account credentials?
90%.