Test 1 Flashcards

(37 cards)

1
Q

The common consensus is that the there is a shortage of cybersecurity professionals, with estimates of about _____ job openings in the US and ______worldwide by 2021

A

300,000 and 3 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the components of an information system

A
Software
Hardware
Data
People
Procedures
Networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

80% of cybersecurity attacks take advantage of one major vulnerability. The weakest link of any system is/are:

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information is data + _________

A

Context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA stands for?

A

Confidentiality
Integrity
Accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Chief Information Officersand any high level information security professionals need some professional certifications . Name one.

A

CEH

certified ethical hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

enables authonzed users either people or computer systems-to access information without interference or obstruction, and to receive it in the required formation

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

occurs when information is free from mistakes or errors and has the value that the end user expects

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

of information is the quality or state of being genuine or original, rather than a reproduction or fabrication Information is authentic when it is in the same state in which it was created placed, stored, or transferred.

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is achieved when disclosure or exposure of information is restricted only to authorized individuals or systems. It ensures that only people with the rights and privileges to access information are able to do so.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

of information is maintained when it is wholecomplete, and uncorrupted

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

of information is the quality or state of the information having value for some particular purpose or end .

A

Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

of information is the quality or state of ownership or control of some object or item. Information is said to be in one’s possession if one obtains itindependent of format or other characteristics

A

Possession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Jenny lost a flash drive with critical company data on itthat outsiders should not see. But the data on it is encrypted. This is a loss of _________ but not of ________

A

Possession

Not confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mark is working overtime at his computerSuddenly the service he is accessing goes offline, and Mark realizes it’s been taken offline for a scheduled downtime to install updates/patches. This is a loss of __________

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The service comes back online. Mark accidentally deletes some data from the server. This affects _______

17
Q

Mark uploads the right data from files he has on his computer, but these are older versions of the right data. This leads to lack of _______

18
Q

Nancy has downloaded some company data they needBut their computer doesn’t have software which can open that format. This is a loss of _______

19
Q

Ransomed are encrypts all data on victim’s computer, leading to a loss of _______

20
Q

Newer versions of ransomware (since about 2020) exfiltrate (transfer out) all the victim’s data over the internet, and threaten them with disclosing it if they don’t pay up. This is a separate issue of _________

A

Confidentiality

21
Q

CIA triangle addresses the fundamental concerns of information. It ________ address all the critical characteristics of information that define its value.

22
Q

No one knows for sure why squirrels are drawn to telecom and internet fiber. In the past few years, major carriers have had to spend tremendous resources to protect their networks from squirrel chews by installing cable guards. even those are not enough to stop the squirrels entirely.

This attack falls primarily under the category:

It can also be categorized asforces of nature:

A

Deviations in Quality Service

Forces or nature

23
Q

Scammers call you and claim to be from the tech support team of Microsoft or other vendors. They then offer to help solve your computer problemsScammers often use publicly available directories, so they might know your name and other personal information when they call you. They might even guess what operating system you’re using

Once they’ve gained your trust, they might ask for your user name and password or ask you to go to a legitimate website to install software that will let them access your computer to fix it. you install the software and provide credentials, your computer and your personal information are vulnerable.

This attack falls primarily under the category:

be categorized as:

A

Human error or failure

Espionage or trespass

24
Q

Suspects allegedly used social engineering and managed to plant malware onto the targeted companies networks.
Once they had established illegitimate access to corporate email accounts, they then allegedly monitored communications, sniffing around for payment requests. The fraudsters then set up a simultaneous transaction with a targeted company’s real site.
This attack talls primanily under the category:
It can also be categorized as:

A

Espionage or Trespass

Theft

25
Hancock Health paid hackers $55,000 in January 2018 to unlock systems following a cyberattack. The threat actors behind the attack targeted over 1,400 files and renamed them to "I'm sorry as part of the attack. The hackers believed to be located in Eastern Europe, gained access to hospital systems by logging in with a third-party vendor's credentials into the Hancock Hospital remote access portal, targeted vulnerable servers which were then used to propagate the attack. This attack falls primarily under the category: It can also be categorized as:
Espionage or trespass Sabotage or vandalism
26
Meltdown is a hardware vulnerability affecting Intel microprocessors , IBM POWER processors, and some ARM-based microprocessors . It allows a rogue process to read all memory , even when it is not authorized to do so: Meltdown was issued a Common Vulnerabilities and Exposures ID of CVE -2017-5754, also known as Rogue Data Cache Load (RDCL ), in January 2018. It was disclosed in conjunction with another exploit Spectre, with which it shares somebut not all characteristics. The Meltdown and Spectre vulnerabilities are considered "catastrophic" by security analysts. The vulnerabilities are so severe that initially, security researchers believed the reports to be false This falls primarily under the category: It can also be categorized as:
Human error or failure Technical hardware failures or errors
27
"Malicious websites were used to secretly hack into Phones tor years, says Google” This attack falis primarily under the category: It can also be categorized as: ___ exploit chains were involved, and ___vulnerabilities (security flaws)
Espionage or trespass Information extortion 5 12
28
"Hackers could steal a Tesla Model S by cloning its key fob-again" This attack falls primarily under the category: It can also be categorized as:
Theft Espionage or trespass
29
3) "Microsoft's lead EU data watchdog is looking into fresh Windows 10 privacy concerns” This is: Is Privacy addressed by CIA triad?:
Espionage or Trespass No
30
"U.S. cyberattack hurt Iran's ability to target oil tankers, officials say” This is:
Espionage or Trespass
31
"Apple is turning Siri audio clip review off by default and bringing it in house" Is this a cybersecurity attack ? Where would you categorize it ?
Espionage or Trespass
32
Where does 80 percent of cybercrime come from?
Highly organized and ultrasophisticated criminal gangs
33
How much does cybercrime make?
445 billion dollars
34
How does cyber crime work? How do they operate?
Drye wolf. Would obtain from usually clinking a link from a phishing email and it will sit and wait till you log in into your bank.
35
What is an approach to change the economics for cyber criminals?
Finding what the top priority is. What’s infected and how’s it spreading. Working to stop the spread in its tracks and informing others how to protect themselves.
36
What is the reality of organizations Effected by cybercrime?
Far more likely to keep information on that attack to themselves because they are worried about competitive advantage, litigation, or regulation.
37
What if IBM were to take our data and open it up? And publish it all openly on the internet? They did. What happened?
It opened and helped other organizations on security threats. We need to be more open and collaborative.