Parcial 1 Flashcards

(47 cards)

1
Q

What is cybersecurity?

A

protection of networked system and data from unathorized use or harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is offline identity

A

your identity that interacts on a regular basis at home, school or work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is online identity?

A

your identity while you are in cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does the online identity should have?

A

limited amount of information and username or alias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the rules to have a safe online identity?

A

not include any personal information. be apropiate and respectful, and not attract unwanted attention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of data do you have?

A

medical records, education records and employment and financial records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how do the criminals get your moneu?

A

online credentials and creative schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does online credential means?

A

give thiefs access to your accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does creative schemes mean?

A

trick into wiring money to your friends or family

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

why do the criminals want your identity

A

for long term profits, medical benefits, file a fake tax return, open credit card accounts and obtain loans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the types of organizational data?

A

Traditional data and internet of the things and big data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what data does traditional data has?

A

personell (application materials, payroll, offer), intellectual (patents, trademarks, trade secrets), and financial (income statements, balance sheets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what data does the internet of things and big data has?

A

IoT (large network of pyshical objects such as sensors) and big data (data from the IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does confidentiality means

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does integrity means

A

accuracy and thrustworthiness of the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what does availability means

A

information is accesible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are the types of attackers?

A

amateurs, hackers and organized hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what does amateurs mean

A

script kiddies with little to no skill, and the use of existing tools or instructions found online for attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what kind of hackers are?

A

white hats, grey hats and black hats

20
Q

what does white hats mean

A

people that break into a system with permission to discover weakness so that the security of these systems can be improved

21
Q

what does gray hats mean

A

people who compromise systems without permission

22
Q

what does black hats mean

A

people who take advantage of any vulnerability for illegal personal, financial or political gain

23
Q

what does organized hackers mean

A

organizations of cyber criminals, hacktivists, terrorits and state-sponsored hackers

24
Q

whats one example of internal security threats

A

an employee or contract partner

25
why is an employee or contract partner an internal security threat
because they can mishandle confidentia data, threaten the operations of internal servers or network infraestructure devices, facilitate outisde attacks by connecting infected USB media into the corporate computer system, accidentally invite malware onto the network through malicious email or websites and can cause great damages because of direct access
26
what does esternal seurity threats mean
exploit vulnerabilities in network or computing devices and the use of social engineering to gain access
27
what is the cyberwarfare
conflict using the cyberspace
28
what does the stucnet malware did?
designed to damage irans nuclear enrichment plan, using modular coding and stole digital certificates
29
what is one example of an impact of security breach
vtech a toy maker for children that exposed sensitive information including customer names, etc hackers could create email accounts and apply for credits and commit crimes using the children's information
30
what is an example of cyberwarfare
stuxnet malware
31
what is the purpose of the cyberwarfare
to gain advantage over adversaries, nations or competitos
32
what does the cyberwarfare can do
sabotage the infraestructure of other nations, give the attackers the ability to blackmail governmental personnel, citizens may lose confidence in the government's ability to protect them and can affect the citizen's faith in their government without ever physically invading the targeted nations
33
what is a security policy?
A directive that defines a specific behavior for one or more individuals within the corporation
34
for what is designed a security policy?
to reduce a specific set of security risks to a level accpetable to manage
35
what is the essential foundation of an effective information security program?
policy
36
why is policy so important
because it sets the tone and emphasis on the importance of information security
37
what are the objetives of a security policy
reduce risk, compliance with laws and regulations and assurance of operational continuity, information integrity and confidentiality
38
what are the least expensive means of control and often the most difficult to implement
policies
39
what are the basic rules for shaping a policy
should never conflict with the law, must be able to stand up in court if challenged and must be properly supported and administrated
40
what are the types of information securoty policy
enterprise information security program policy, issue-specific information security policies and systems specific policies
41
what is the basic security polity process
indetify what assets you need to protect, identify the threats to those assets, use frameworks and industry specific guidelines to select and implement controls to mitigate threats, monitor compliance and effectiveness of controls(metrics) and periodically review and update controls
42
what type of controls are to mitigate threats in a bsaic security policy?
policies and procedures, technical controls and human controls
43
a security policy is created through an analysis of what information?
pertinent legislation and regulations, agreements with other parties, higher level policies, detailed knowledge of the target IT system, anticipated threats, implementation and operational costs, and managment risk tolerance
44
success is dependent on four interdependent components
strong upper level managment support, practival security policies and procedures, properly implemented controls and quantifiable performance metrics and analysis
45
what are the common problems of policies
systems are already developed, personnel are already in place with various levels of training, some policy may exist, some proceudres may be in place, some controls are in place and some metrics may be used to measure compliance
46
what should i do to build an effective security policy
organize your security policy development team, conduct a security self assessment, assess security risks, develop a risk mitigation strategy, measure your security controls, and formalize and write your security policy
47
what should the security policy development team should do
obtain leadership and involment of senior managment, identify and recruit internal and external stakeholders and obtain ther input and support