week 9 Flashcards
(33 cards)
disclosure
confidentiality
alteration
integrity
denial
availability
What’s Cyber Security
- The protection of information assets by addressing threats to
information processed,
Cyber Security Awareness
Cybersecurity addresses both internal and external threats to an organization
Risk :
The likelihood that something bad will happen that causes harm to an informational asset
Asset:
Something that has tangible or intangible value that is worth protecting
Vulnerability :
A weakness that could be used to endanger or cause harm to an informational asset
Threat :
A potential cause of an unwanted incident.
Residual risk:
Even after controls are in place, there will always be residual risk, defined as the remaining risk after management has implemented a risk response.
Inherent risk:
The risk level or exposure without taking into account the actions that management has taken or might take
Third party risk :
Information sharing , restricted access
Risk Management
the process of identifying vulnerabilities and
threats to information resources, and deciding what
countermeasures to take to reduce risk
Cyber Security Implementation Approaches Compliance Based :
relying on industry standards, controls are
implemented disregard their applicability.
Risk Based :
Discover risks affecting organization and then design
appropriate security controls to address the risk
Ad-hoc approach:
Implements Security with no relevant standard or
criteria
How to measure risks
Risk tolerance
Size and scope of the environment
Amount of Data available
Threat agents
Corporations:
breach security boundaries and perform malicious acts to gain a competitive advantage.
Nation States
target government and private entities with a high level of sophistication to obtain intelligence or carry out other destructive activities.
Hacktivists
hackers may target specific individuals or
organizations
Cyberterrorists
use violence to achieve their goals, cyberterrorists frequently target critical infrastructures and government groups.
Cybercriminals:
Motivated by the desire for profit,
Cyber warriors
act on behalf of a political party or against another political party that threatens them.
Script Kiddies
young individuals who are learning to hack