Untitled Deck Flashcards

(12 cards)

1
Q

What does the “CIA” triangle stand for in cybersecurity?

A

Confidentiality, Integrity, Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the definition of information security?

A

Preservation of confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are additional properties often involved in information security?

A

Authenticity, accountability, non-repudiation, reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the issue with prioritizing security in software development?

A

It is often considered last until something goes wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four main causes of IoT vulnerabilities (Icefall report)?

A

Insecure protocols, weak/broken authentication, insecure firmware updates, remote code execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kind of attacks did hospital robots suffer according to Cyn22?

A

Medication disruption, elevator interference, surveillance, unauthorized access, malware injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How much does a cybersecurity breach cost on average according to Cro23?

A

$4.45 million.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a “root of trust” in cybersecurity?

A

The foundational security assumption, often root certificates in browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are key components needed for Chrome security enhancement (Gou21)?

A

CET-enabled CPU, hardware-enforced stack protection, Chrome 90+.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What was the major software supply chain attack mentioned?

A

The SolarWinds breach of 2020.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is mobile security often overlooked?

A

Business leaders don’t see apps as top security threats, focusing more on market speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What standard defines key terms in information security management systems?

A

ISO/IEC 27000:2018.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly