Unit 1: Cybersecurity Principles Flashcards

(69 cards)

1
Q

“RAM”?

A

Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

“ROM”?

A

Read Only Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference in RAM and Storage (as human equivalent)

A

RAM=short-term memory

Storage=long-term memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purpose of IEEE

A

Creating standards for electronics manufacturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Complexity principle (re: compromise)

A

More complicated = less likely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Principle of ‘security’

A

Security exists only so far as the ability to prevent threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Outline Log4j attacks.

A

Hackers exploiting vulnerability in Java in the back end to access a user’s command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Catfishing?

A

-Attacker poses as attractive person online
-Defrauds victim who is now in love with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define ‘Advanced Persistent Threat’ (3)

A
  1. Sophisticated, sustained cyber attack; 2. Intruder establishes undetected presence;
  2. To steal data over a long time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between LAN and WAN.

A

LAN = Router looks inside to groups of devices;

WAN = LANs connected by Internet Service Providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define ‘Source Code’.

A

A text listing of commands to be compiled or assembled into an executable program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Language used to write (most) operating systems.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Outline ‘Supply Chain Attack’ (3)

A
  1. Attacker infects software upstream in the supply chain; 2. Malware spreads to other area in the network; 3. Allows access to sensitive data in downstream organisations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Boolean Operator? (2)

A
  1. A word or phrase connecting search terms; 2. To create a logical phrase understandable to database.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of Boolean Operators (3) and their functions (3).

A
  1. AND: requires both search terms to be present.
  2. OR: one or the other term must be present in result.
  3. NOT: excludes search results that contain the search term.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Search for scissors on Italian websites using Google Dorking.

A

“scissors” site:.it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Search for A-Level Mathematics Results on the UCAS website only.

A

“A-level mathematics results” site:ucas.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Search for cybersecurity, but only for results related to hacking.

A

“cybersecurity” AND “hacking”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Hazard?

A

Potential issue that may lead to vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Vulnerability?

A

Actual weaknesses open to exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Risk?

A

Potential exposure to breach and the impacts of breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Give examples of Cybersecurity hazards (3)

A
  1. Using online database.
  2. Located in a particular country.
  3. Dealing with certain types of clients/industries.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Give examples of Cybersecurity (3)

A
  1. Physical/Social: real-world, people.
  2. Logical: software, network.
  3. External: 3rd-party dependence.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Give examples of things breaches can impact (5)

A
  1. Uptime.
  2. Operations.
  3. Damaged services.
  4. Costs to Reputation.
  5. Penalty costs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The three protection goals in information security.
Confidentiality, integrity, availability.
26
Define “confidentiality”
Preventing unauthorised gain of information.
27
Define “integrity“
Prevention or detection of unauthorised data modification
28
Define “integrity“
Prevention or detection of unauthorised data modification
29
Define “availability”
Prevention of unauthorised deletion or disruption
30
Define “availability”
Prevention of unauthorised deletion or disruption
31
The two types of data that protection goals apply to
1. Data at rest 2. Data in transit.
32
Define “data at rest”
Data stored on a computer or on paper
33
Define “data in transit”
Data being sent over a network
34
Define “ authorised actor”
Person authorised to access a store of data
35
Give an example of accessibility in relation to data stored on a smart phone
Back ups to the cloud in case of machine failure
36
Define “authenticity” as a protection goal
Preventing actors from impersonating someone else
37
Define “non-repudiation” as a protection goal
Preventing actors from denying that they carried out a particular act
38
Why are non-repudiation and authenticity necessary protection goals?
In order to hold actors accountable
39
What is the goal of computer security?
To protect valuable assets
40
What are assets in relation to computer security? (3)
Hardware, software and data
41
Define “threat”
Any occurrence that may result in asset loss or damage
42
Define “information security”
Protection of data and any information derived from its interpretation
43
Define “system security” (2)
1. Ensuring computer systems work as intended 2. by protecting them from attack.
44
What is authentication?
Requiring users to enter a password
45
What are access controls?
Rules that govern the information a user can access
46
Examples of how to achieve confidentiality in system security (2)
1. Data encryption. 2. combination of authentication and access controls.
47
What are “ cyber–physical systems”?
Systems affecting the real world
48
List five examples of cyber-physical systems (5)
1. Traffic lights. 2. Hospital respirators. 3. Power plant control systems. 4. Auto pilot. 5. Industrial robots.
49
What is critical infrastructure?
Systems which have a significant impact on society if they fail
50
Difference between safety and security
Safety: protects against non-malicious threats Security: protects against malicious threats
51
What are benign threats?
Threats due to human errors
52
What are malicious threats?
Threat due to bad intentions
53
What are random attacks?
Attacks where victim is not important so long as there is gain
54
What is a targeted attack?
Strategic attack directed at a particular victim
55
Define “vulnerability“ (2)
1. A flaw or weakness in the systems design implementation or operation and management 2. that could be exploited to violate the systems security policy.
56
How to decide the severity of a risk
1. Impact of possible attack. 2. Likelihood of attack taking place.
57
What are the four ways of handling risks? (4)
1. Avoidance. 2. Mitigation. 3. Transfer. 4. Acceptance.
58
How to avoid risk
Refrain from implementing a feature
59
How to avoid risk
Refrain from implementing a feature
60
How to mitigate risks
Implement counter measures to decrease impact and/or likelihood
61
How to transfer risks
Buy insurance or levy impact onto another party
62
How to transfer risks
Buy insurance or levy impact onto another party
63
What is risk acceptance?
Deciding to cover the cost of an attack
64
What is a “negative externality “in relation to risk?
System designers transfer risk to the users of system
65
What is “negative externality“ in relation to risk?
Designers of system transfer threat impact to the users
66
Problem created by negative externality
Lower incentive for designers to create highly secure systems
67
Problem created by negative externality
Lower incentive for designers to create highly secure systems
68
Define “sensitive data” (6)
Data revealing: ethnic origin, political opinions, beliefs, trade union membership or concerning health or sex life
69
Define “personally identifiable information“ (3)
Information that (1) identifies, (2) describes or (3) is unique to an individual.