1/21
red: numbers
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
80%
cyber attacks on firms in 2020
238%
cyber attacks in banks in 2020
148%
ransomware attacks in 2020
95%
human error
58%
personal data breach
94%
malware: email
48%
malicious email attachments
207
days to identify a breach
marriot international data breach
information of 5.2 million guests was accessed using the login credentials of two employees at a franchise property (credentials were immediately disabled upon discovery along with investigation and heightened monitoring)
magellan ransomware attack
unauthorized actor gained access to systems after sending a phishing email on April 6, 2020 that impersonated a client; eight entities along with 365,000 impacted; exfiltrated logins, personal information, and tax information
bangladesh bank hacking
dridex malware; spelling error led to suspicion of a 20 million transfer to shalika foundation; 81 million in five accounts in RCBC foreign exchange requested freeze during chinese new year
DNC email server hacking
collection of 19,252 _ and 8,034 _ published to wikileaks; these included off the record correspondence with media personalities
yahoo email hacking
tricked into recognizing them as account holders; read contents of 6,500 through forged cookies
software AG ransomware attack
clop ransomware, demanded more than 20 million; has not recovered
twitter data breach
social engineering attack, stole employee credentials to gain access to internal management systems
wannacry ransomware cyberattack
targeted windows based PCs, encrypts computer data, ransom payments in bitcoin from $300-$600
comelec data breach allegations
downloaded 60 GB of data, selling for 60 million
jobs as IT security professional
information assurance and security
cyberwarfare
use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems
types of cyberwarfare
espionage, sabotage, denial of service attack, surprise cyberattack, propaganda, economic cyber attack
motivations for cyberwarfare
military, civil, hacktivism, income generation, nonprofit research
cyberwarfare prevention and mitigation
monitoring, application whitelisting, physical security, incident response plans, employee training