Test 1 Flashcards
(37 cards)
The common consensus is that the there is a shortage of cybersecurity professionals, with estimates of about _____ job openings in the US and ______worldwide by 2021
300,000 and 3 million
Name the components of an information system
Software Hardware Data People Procedures Networks
80% of cybersecurity attacks take advantage of one major vulnerability. The weakest link of any system is/are:
People
Information is data + _________
Context
CIA stands for?
Confidentiality
Integrity
Accessibility
Chief Information Officersand any high level information security professionals need some professional certifications . Name one.
CEH
certified ethical hacker
enables authonzed users either people or computer systems-to access information without interference or obstruction, and to receive it in the required formation
Availability
occurs when information is free from mistakes or errors and has the value that the end user expects
Accuracy
of information is the quality or state of being genuine or original, rather than a reproduction or fabrication Information is authentic when it is in the same state in which it was created placed, stored, or transferred.
Authenticity
is achieved when disclosure or exposure of information is restricted only to authorized individuals or systems. It ensures that only people with the rights and privileges to access information are able to do so.
Confidentiality
of information is maintained when it is wholecomplete, and uncorrupted
Integrity
of information is the quality or state of the information having value for some particular purpose or end .
Utility
of information is the quality or state of ownership or control of some object or item. Information is said to be in one’s possession if one obtains itindependent of format or other characteristics
Possession
Jenny lost a flash drive with critical company data on itthat outsiders should not see. But the data on it is encrypted. This is a loss of _________ but not of ________
Possession
Not confidentiality
Mark is working overtime at his computerSuddenly the service he is accessing goes offline, and Mark realizes it’s been taken offline for a scheduled downtime to install updates/patches. This is a loss of __________
Availability
The service comes back online. Mark accidentally deletes some data from the server. This affects _______
Integrity
Mark uploads the right data from files he has on his computer, but these are older versions of the right data. This leads to lack of _______
Integrity
Nancy has downloaded some company data they needBut their computer doesn’t have software which can open that format. This is a loss of _______
Availability
Ransomed are encrypts all data on victim’s computer, leading to a loss of _______
Availability
Newer versions of ransomware (since about 2020) exfiltrate (transfer out) all the victim’s data over the internet, and threaten them with disclosing it if they don’t pay up. This is a separate issue of _________
Confidentiality
CIA triangle addresses the fundamental concerns of information. It ________ address all the critical characteristics of information that define its value.
Does not
No one knows for sure why squirrels are drawn to telecom and internet fiber. In the past few years, major carriers have had to spend tremendous resources to protect their networks from squirrel chews by installing cable guards. even those are not enough to stop the squirrels entirely.
This attack falls primarily under the category:
It can also be categorized asforces of nature:
Deviations in Quality Service
Forces or nature
Scammers call you and claim to be from the tech support team of Microsoft or other vendors. They then offer to help solve your computer problemsScammers often use publicly available directories, so they might know your name and other personal information when they call you. They might even guess what operating system you’re using
Once they’ve gained your trust, they might ask for your user name and password or ask you to go to a legitimate website to install software that will let them access your computer to fix it. you install the software and provide credentials, your computer and your personal information are vulnerable.
This attack falls primarily under the category:
be categorized as:
Human error or failure
Espionage or trespass
Suspects allegedly used social engineering and managed to plant malware onto the targeted companies networks.
Once they had established illegitimate access to corporate email accounts, they then allegedly monitored communications, sniffing around for payment requests. The fraudsters then set up a simultaneous transaction with a targeted company’s real site.
This attack talls primanily under the category:
It can also be categorized as:
Espionage or Trespass
Theft