Untitled Deck Flashcards
(12 cards)
What does the “CIA” triangle stand for in cybersecurity?
Confidentiality, Integrity, Availability.
What is the definition of information security?
Preservation of confidentiality, integrity, and availability of information.
What are additional properties often involved in information security?
Authenticity, accountability, non-repudiation, reliability.
What is the issue with prioritizing security in software development?
It is often considered last until something goes wrong.
What are the four main causes of IoT vulnerabilities (Icefall report)?
Insecure protocols, weak/broken authentication, insecure firmware updates, remote code execution.
What kind of attacks did hospital robots suffer according to Cyn22?
Medication disruption, elevator interference, surveillance, unauthorized access, malware injection.
How much does a cybersecurity breach cost on average according to Cro23?
$4.45 million.
What is a “root of trust” in cybersecurity?
The foundational security assumption, often root certificates in browsers.
What are key components needed for Chrome security enhancement (Gou21)?
CET-enabled CPU, hardware-enforced stack protection, Chrome 90+.
What was the major software supply chain attack mentioned?
The SolarWinds breach of 2020.
Why is mobile security often overlooked?
Business leaders don’t see apps as top security threats, focusing more on market speed.
What standard defines key terms in information security management systems?
ISO/IEC 27000:2018.