P3 - 8. Cybersecurity Risk Flashcards

1
Q

What are the 3 drivers of the importance of security of data?

A
  1. Commercial sensitivity
  2. Competitive advantage
  3. Legal duty to protect personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 objectives of cybersecurity?

A
  1. Availability
  2. Confidentiality
  3. Integrity of data
  4. Integrity of processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 of the biggest technology factors that impact of cyber security risk?

A
  1. Outsourcing of IT
  2. Use of mobile devices
  3. Network structure
  4. Dependence on emerging technologies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 4 of the biggest organisational factors that impact of cyber security risk?

A
  1. Structure and size of IT department
  2. Types of user group
  3. Geographic location (+ legal issues)
  4. Organisational structure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is malware?

A

Software specifically designed to disrupt, damage or gain unauthorised access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 main types of malware?

A
  1. Virus
  2. Worm
  3. Trojan
  4. Spyware
  5. Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 main defences against malware?

A
  1. Antivirus software
  2. Regular updates
  3. User vigilance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are application attakcs?

A

Targeting websites to alter their functionality and presentation or extract sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 4 main types of application attack?

A
  1. Bot
  2. Distributed Denial of Service
  3. Cross site scripting
  4. SQL injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 main defences against application attacks?

A
  1. Anti-bot software
  2. Firewalls
  3. Data validation fields
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a hacker?

A

A skilled computer programmer who circumvents and organisation’s security systems to access sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 2 factors are most likely to make an individual more susceptible to a social engineering attack?

A
  1. Level of access
  2. Routine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 aims of a cybersecurity policy?

A
  1. Protect
  2. Detect
  3. Respond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What 4 elements of governance can an organisation implement to help strengthen cybersecurity?

A
  1. Establishing and communicating ethical values
  2. Board oversight and commitment
  3. Establishing accountability
  4. Hiring and developing qualified personnel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What 4 ways can an organisation ensure communication of their cyber security objectives?

A
  1. Training and awareness programmes
  2. Policy and procedures manual
  3. Code of conduct
  4. Promotion of whistle-blower hotlines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 4 main security control types?

A
  1. Policies and procedures
  2. Software updates
  3. Configuration controls
  4. Specialist software (e.g. firewall/anti-virus)
17
Q

What 3 areas could be monitored within a cyber security programme?

A
  1. Monitor network traffic
  2. Monitor user activity
  3. Monitor all systems e.g. wireless systems
18
Q

What is Business Continuity Planning?

A

A proactive approach that allows the organisation to continue to operate while a cybersecurity threat is resolved

19
Q

What is disaster recovery planning?

A

A reactive approach that focuses on solely taking action to restore the organisation to its original position

20
Q

What is forensic analysis?

A

Detailed examination of systems relating to a particular breach or attempted breach

21
Q

What are the 2 types of malware analysis?

A
  1. Reverse engineering (break down into parts)
  2. Decompilation and disassembly (forensic analysis of parts)
22
Q

What is penetration testing?

A

Seeking out potential weaknesses in a system

23
Q

What are the 3 stages of penetration testing?

A
  1. Network discovery
  2. Vulnerability probing
  3. Exploiting volunerabilities
24
Q

What are the 3 levels of software security?

A
  1. Block
  2. Alert
  3. Protect sensitive data