Unit 1: Cybersecurity Principles Flashcards
(69 cards)
“RAM”?
Random Access Memory
“ROM”?
Read Only Memory
Difference in RAM and Storage (as human equivalent)
RAM=short-term memory
Storage=long-term memory
Purpose of IEEE
Creating standards for electronics manufacturing
Complexity principle (re: compromise)
More complicated = less likely
Principle of ‘security’
Security exists only so far as the ability to prevent threats.
Outline Log4j attacks.
Hackers exploiting vulnerability in Java in the back end to access a user’s command line.
What is Catfishing?
-Attacker poses as attractive person online
-Defrauds victim who is now in love with them
Define ‘Advanced Persistent Threat’ (3)
- Sophisticated, sustained cyber attack; 2. Intruder establishes undetected presence;
- To steal data over a long time.
Difference between LAN and WAN.
LAN = Router looks inside to groups of devices;
WAN = LANs connected by Internet Service Providers.
Define ‘Source Code’.
A text listing of commands to be compiled or assembled into an executable program.
Language used to write (most) operating systems.
C
Outline ‘Supply Chain Attack’ (3)
- Attacker infects software upstream in the supply chain; 2. Malware spreads to other area in the network; 3. Allows access to sensitive data in downstream organisations.
What is a Boolean Operator? (2)
- A word or phrase connecting search terms; 2. To create a logical phrase understandable to database.
Examples of Boolean Operators (3) and their functions (3).
- AND: requires both search terms to be present.
- OR: one or the other term must be present in result.
- NOT: excludes search results that contain the search term.
Search for scissors on Italian websites using Google Dorking.
“scissors” site:.it
Search for A-Level Mathematics Results on the UCAS website only.
“A-level mathematics results” site:ucas.com
Search for cybersecurity, but only for results related to hacking.
“cybersecurity” AND “hacking”
What is a Hazard?
Potential issue that may lead to vulnerability.
What is a Vulnerability?
Actual weaknesses open to exploit.
What is a Risk?
Potential exposure to breach and the impacts of breach.
Give examples of Cybersecurity hazards (3)
- Using online database.
- Located in a particular country.
- Dealing with certain types of clients/industries.
Give examples of Cybersecurity (3)
- Physical/Social: real-world, people.
- Logical: software, network.
- External: 3rd-party dependence.
Give examples of things breaches can impact (5)
- Uptime.
- Operations.
- Damaged services.
- Costs to Reputation.
- Penalty costs.