Week 3 Flashcards

(21 cards)

1
Q

What are the 4 stages of the risk management lifecycle?

A

Identify (find risks)
Analyse (assess impact & probability)
Treat (mitigate, avoid, transfer, or accept)
Monitor (keep watching for changes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two things determine a risk’s rating?

A

Impact (how bad it is)
Probability (how likely it is)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 3 key factors in measuring impact?

A

Loss of confidentiality/integrity (e.g., data leaks)
System unavailability (e.g., downtime costs)
Indirect harm (e.g., reputation damage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What makes an attack more likely?

A

Easy-to-exploit vulnerabilities
High-value target (e.g., customer data)
History of similar attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s the difference between qualitative and quantitative risk analysis?

A

Qualitative = Uses words (Low, Medium, High)
Quantitative = Uses numbers (e.g., $10,000 loss)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 4 ways to handle risks?

A
  1. Avoid

🚫 Stop the risky activity entirely.
Example: Discontinue using an insecure IoT device if the risk is too high.

  1. Mitigate

🛡️ Reduce the risk’s impact or likelihood.
Example: Install security patches or use firewalls to protect IoT devices.

  1. Transfer

📜 Shift the risk to someone else.
Example: Buy cyber insurance to cover financial losses from a breach.

  1. Accept

🤷 Live with the risk (if fixing it costs more than the harm).
Example: Ignoring minor risks on a low-value device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 types of security controls?

A

Preventive (stop attacks, e.g., firewalls)
Detective (find attacks, e.g., monitoring)
Reactive (respond, e.g., backups)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 3 important security controls from CIS.

A

Patch management (fix vulnerabilities)
Access control (limit who can see data)
Incident response (plan for breaches)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is continuous monitoring important?

A

To catch new threats early (e.g., malware, unpatched systems).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What makes risk management difficult?

A

Hard to value intangible assets (e.g., reputation)
Future attacks are unpredictable
Deciding which risks to accept is subjective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A hacker exploits weak passwords. What’s the impact, probability, and a possible control?

A

Impact: High (data theft)
Probability: Medium (common attack)
Control: Multi-factor authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is IoT?

A

A network of smart devices (like cameras, thermostats, wearables) that connect to the internet to share data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 4 main steps in IoT data flow?

A

Device (sensor collects data).
Network (Wi-Fi/Bluetooth sends data).
Cloud (stores/processes data).
User (views/controls via app).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do traditional risk assessments fail for IoT?

A

Because IoT devices change constantly, but old methods check risks only every few months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is IoT security hard for companies?

A

They often don’t even know all the connected devices (e.g., third-party gadgets).

Example: British Airways hack came from a third-party vendor’s software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can hackers misuse IoT devices?

A

They hack them to launch big attacks (like DDoS), not just steal data.

Example: Mirai Botnet (2016) – Used hacked cameras to crash websites.

17
Q

What’s the “glue” problem in IoT security?

A

Risk checks focus on devices, not how they interact (e.g., a smart lightbulb hacked to access a corporate network).

18
Q

Name 3 big IoT security flaws.

A

Default passwords (e.g., “admin/admin”).
No encryption (easy data theft).
No updates (devices stay vulnerable).

Example: Some cameras hacked in under 2 minutes!

19
Q

What’s one law improving IoT security?

A

UK’s 2022 IoT Law bans default passwords and forces security updates.

20
Q

What’s the #1 thing users should do for IoT safety?

A

Change default passwords and update firmware regularly!

21
Q

A smart fridge gets hacked. What’s the risk?

A

Could join a botnet to attack other systems.
Could leak Wi-Fi passwords to hackers.
Fix: Use strong passwords + updates.