Intro to Cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

cybersecurity

measures and controls that protect the computer CIA triad

2
New cards

CIA triad

confidentiality, availability, integrity

3
New cards

confidentiality

proper authorized access to information

4
New cards

availability

proper access to information

5
New cards

integrity

protection against improper modification

6
New cards

A student leaking grades from Canvas databases is a threat to ___

confidentiality

7
New cards

The shutdown of the reporting feature of a video game is a threat to ___

availability

8
New cards

Nonrepudiation, the inability to track modifications, is a threat to ____

integrity

9
New cards

The NPD breach which leaked a variety of personal information is an example of a ____ impact breach

high

10
New cards

In a survey of 100 users, 10 reported that they could not access the accessibility settings of an app. This is an example of a ___ impact breach

low

11
New cards

A temporary shutdown of a server for all users is an example of ____ impact breach

medium

12
New cards

Why does management proficiency conflict with cybersecurity

  • fallible individuals in charge with personal information

  • requires constant monitoring

  • implementation (eg. 2 factor authentication) considered a nuisance among user base

  • implemented as an afterthought

13
New cards

What makes cybersecurity difficult to implement, even when funded and approved

  • must understand creative attacker mindsets

  • must tactically place countermeasures effectively (eg. firewalls)

14
New cards

adversary/threat agent

any entity that threatens to breach the CIA triad

15
New cards

T/F - North Korea could be considered an adversary

True

Nations and governments with attack resources can undermine the CIA triad

16
New cards

Differentiate a threat and an attack

  • threats describe possible events that undermine the CIA triad

  • attacks are threats that are carried out

17
New cards

risk

probability of a threat + severity of threat

18
New cards

Differentiate countermeasures from security policies

  • countermeasures block attacks

  • security policies defines and restrict user activity to maintain the CIA triad

19
New cards

A firewall is an example of a ____

countermeasure

20
New cards

Two-factor authentication is an example of a ____

security policy

21
New cards

vulnerability

weaknesses in a system that can be exploited

22
New cards

system resource/asset

component essential to a system’s operation

23
New cards

T/F - A school’s IT department is an example of a system resource

True

Human resources may be considered assets

24
New cards

What is the relationship between countermeasures and risk

As countermeasures increase, risk decreases

25
New cards

UT abbreviation

User target

26
New cards

IBS abbreviation

infrastructure

27
New cards

CC abbreviation

communication channel