Organizational Data Flashcards

(33 cards)

1
Q

details relating to buying and selling, production activities and basic organizational operations such as any information used to make employment decisions.

A

Transactional data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

patents, trademarks and new product plans, which allows an organization to gain economic advantage over its competitors. This information is often considered a trade secret and losing it could prove

A

Intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

income statements, balance sheets and cash flow statements, which provide insight into the health of a company.

A

Financial data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a large network of physical objects, such as sensors, software and other equipment. All of these ‘things’ are connected to the Internet, with the ability to collect and share data. And given that storage options are expanding through the cloud and virtualization, it’s no surprise that the emergence of IoT has led to an exponential growth in data, creating a new area of interest in technology and business called ‘Big Data.’

A

IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a model framework created in 1991 to help organizations establish and evaluate information security initiatives by considering all of the related factors that impact them. This security model has three dimensions

A

The McCumber Cube

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The McCumber Cube security model has three dimensions:

A
  1. The foundational principles for protecting information systems.
  2. The protection of information in each of its possible states.
  3. The security measures used to protect data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a set of rules that prevents sensitive information from being disclosed to unauthorized people, resources and processes. Methods to ensure this include data encryption, identity proofing and two factor authentication.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ensures that system information or processes are protected from intentional or accidental modification. One way to ensure integrity is to use a hash function or checksum.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authorized users are able to access systems and data when and where needed and those that do not meet established conditions, are not. This can be achieved by maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data that is being used to perform an operation such as updating a database record (data in process).

A

Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

data stored in memory or on a permanent storage device such as a hard drive, solid-state drive or USB drive (data at rest).

A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

data traveling between information systems (data in transit).

A

Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the measures put in place by an organization to ensure that users are knowledgeable about potential security threats and the actions they can take to protect information systems.

A

Awareness, training and education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the software- and hardware-based solutions designed to protect information systems such as firewalls, which continuously monitor your network in search of possible malicious incidents.

A

Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the administrative controls that provide a foundation for how an organization implements information assurance, such as incident response plans and best practice guidelines.

A

Policy and procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a group of linked servers providing data storage, databases, networking, and software through the Internet

A

cloud cluster

17
Q

an incident that results in unauthorized access to data, applications, services or devices, exposing private information that attackers can use for financial gain or other advantages.

A

security breach

18
Q

individuals or groups who attempt to exploit vulnerability for personal or financial gain

19
Q

3 categories of attackers

A
  1. White hat
  2. Gray hat
  3. Black hat
20
Q

amateur or inexperienced hackers who use existing tools or instructions found on the Internet to launch attacks

A

script kiddies

21
Q

This group of attackers break into computer systems or networks to gain access

22
Q

break into networks or computer systems to identify any weaknesses so that the security of a system or network can be improved. These break-ins are done with prior permission and any results are reported back to the owner.

A

White hat attackers

23
Q

set out to find vulnerabilities in a system but they will only report their findings to the owners of a system if doing so coincides with their agenda. Or they might even publish details about the vulnerability on the internet so that other attackers can exploit it.

A

Gray hat attackers

24
Q

take advantage of any vulnerability for illegal personal, financial or political gain.

A

Black hat attackers

25
These attackers include organizations of cyber criminals, hacktivists, terrorists and state-sponsored hackers. They are usually highly sophisticated and organized, and may even provide cybercrime as a service to other criminals.
Organized hackers
26
make political statements to create awareness about issues that are important to them.
Hacktivists
27
gather intelligence or commit sabotage on behalf of their government. They are usually highly trained and well-funded and their attacks are focused on specific goals that are beneficial to their government.
State-sponsored attackers
28
the use of technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services, such as shutting down a power grid.
Cyberwarfare
29
primarily spreads via USB sticks. Non-internet connected systems that then propagate by escalating privilege levels through zero day exploits. Notable for the fact that true zeros are special and they're only valuable for a short period of time. Very expensive, very hard to come by.
non-trivial distribution
30
This is an intelligent worm initially targeting Windows computers, where it even installs its own drivers using a stolen, but legitimate certificate. The offending certificate gets revoked, of course, but then another one gets added within 24 hours
Sophistication
31
This thing can get new tires while still on the road and multiple control servers. Now more including peer-to-peer. When two run into each other, they compare versions and make sure that they're both updated.
modular coding
32
PLC
programmable logic controller
33
These are small embedded condustrial control systems that run all sorts of automated processes. will leverage a vulnerability in the controller software to reach in and change very specific bits of data. Shut things off.
unique targeting