1/43
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
information security
protecting information systems from unauthorized access, disruption, or destruction
confidentiality
keeping data private
integrity
making sure data isn’t altered
availability
ensuring systems and data are accessible when needed
IT Risk
potential for loss or damage to IT systems/data
operational IT risk
system failure and human error
security IT risk
unauthorized access, hacking
compliance IT risk
violating laws or regulations
reputational IT risk
data breach leading to loss of trust
natural threats
floods and tornados
unintentional threats
employee mistakenly accessing the wrong information
intentional threats
spyware, malware, adware companies, or the actions of disgruntled employees
vulnerability
known weaknesses that can be exploited by an attacker
how can develop a strategy for vulnerability
identifying weak points
managing threats
team members stay informed of current trends in cybersecurity, perform regular risk assessments, and conduct penetration testing
Red team
attacks/hacks the infrastructure
Blue team
defenders against attacks
ransomware attacks
protect against ransomware through robust backup strategies, employee awareness training, and regular security patching
five ways to avoid falling victim to phishing scams
note email addresses, be suspicious of ask for sensitive information, never respond to request for personal information, beware of phone phishing scams, never follow the links in an email if you suspect they might be phishing
how to prevent supply chain attacks
vendor vetting, regular security assessments, and robust incident response reports
APTs
sophisticated, long-term cyber-attacks targeting specific entities, such as governments or large organizations
how to mitigate APTs
strong access controls, regular security assessments, and advance threat detection and response technologies
mitigate IoT vulnerabilities by having
strong passwords regular firmware updates, and network segregation
denial of service (DOS) attacks
make system unusable so denies access/disrupts workflow
how to combat social engineering and phishing attacks
cybersecurity awareness training, two-factor authentication, and cautious information sharing
cybercriminals leverage
artificial intelligence to orchestrate sophisticated attacks
how to counteract malicious AI
adopt AI based security solutions and invest in AI driven defense mechanisms
significant concerns of cloud security risks
misconfigurations, data breaches, and unauthorized access to cloud environments
cloud security risk minimization strategies
prioritize secure cloud configurations, strong authentication and encryption, ad continuous monitoring of cloud environments
how to protect mobile malware and vulnerabilities
reputable security apps, regular operating system updates, and continuous app downloads
how to prevent insider threats
strict access controls, employee activity monitoring, and regular cybersecurity training
data breach
information is accesses and extracted without authorization
data leak
data located where it is not supposed to be. confidential info open to the public, sold on the black market or held for ransom
best practices to prevent data breaches
investing in the right security infrastructure, vulnerability assessment, policy for equipment use, staff training
backup (business continuity plan)
provides an exact copy of a systems information
recovery
able to get a system up and running after a crash
disaster recovery
able to recover information or system in the event of a catastrophic disaster such as a fire or flood
business continuity plan
backup and recovery, disaster recovery, and business continuity planning
business continuity planning
creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption
first step to managing risk
understanding your vulnerability
point of access =
key to everything
access management
multi-factor authentication, known device, role-based access management
be cybersafe
update your software, create a passphrase for all passwords, review phishing scams, tweak your settings
cybersecurity best practices
strong, unique passwords, two-factor authentication, think before you click, backups, keep system updated