week 9 Flashcards

(33 cards)

1
Q

disclosure

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

alteration

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

denial

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s Cyber Security

A
  • The protection of information assets by addressing threats to
    information processed,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber Security Awareness

A

Cybersecurity addresses both internal and external threats to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk :

A

The likelihood that something bad will happen that causes harm to an informational asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asset:

A

Something that has tangible or intangible value that is worth protecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability :

A

A weakness that could be used to endanger or cause harm to an informational asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat :

A

A potential cause of an unwanted incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Residual risk:

A

Even after controls are in place, there will always be residual risk, defined as the remaining risk after management has implemented a risk response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Inherent risk:

A

The risk level or exposure without taking into account the actions that management has taken or might take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Third party risk :

A

Information sharing , restricted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Management

A

the process of identifying vulnerabilities and
threats to information resources, and deciding what
countermeasures to take to reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyber Security Implementation Approaches Compliance Based :

A

relying on industry standards, controls are
implemented disregard their applicability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Based :

A

Discover risks affecting organization and then design
appropriate security controls to address the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ad-hoc approach:

A

Implements Security with no relevant standard or
criteria

16
Q

How to measure risks

A

Risk tolerance
Size and scope of the environment
Amount of Data available

17
Q

Threat agents
Corporations:

A

breach security boundaries and perform malicious acts to gain a competitive advantage.

18
Q

Nation States

A

target government and private entities with a high level of sophistication to obtain intelligence or carry out other destructive activities.

19
Q

Hacktivists

A

hackers may target specific individuals or
organizations

20
Q

Cyberterrorists

A

use violence to achieve their goals, cyberterrorists frequently target critical infrastructures and government groups.

21
Q

Cybercriminals:

A

Motivated by the desire for profit,

22
Q

Cyber warriors

A

act on behalf of a political party or against another political party that threatens them.

23
Q

Script Kiddies

A

young individuals who are learning to hack

24
Online Social Hackers
involved in cyberbullying, identity theft
25
Employees
dissatisfied current or former employees represent a clear cybersecurity risk.
26
Attack:
the occurrence of a threat caused by threat agent to an asset.
27
Attack vector:
is the path used to get access to the target (asset).
28
Attack mechanism:
how to deliver an exploit.
29
Attack process steps
Perform reconnaissance Create attack tools Deliver malicious capabilities Exploit and compromise Conduct an attack Achieve results Maintain a presence or set of capabilities Coordinate a campaign
30
malware
A software designed to gain access to targeted computer systems, steal information or disrupt computer operations
31
Malware types
virus : replicate itself and spread from one computer to another worm :replicate itself spread in computer network trojan horse : hide within application botnet : network of infected machines spyware : gathers information adware : show unwanted ads to users
32
Ransomware
type of malware that locks your files or computer until you pay up