Cybersecurity Trends (Week 3 SDL)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

What is the estimated annual cost of cybercrime by 2025?

$10.5 trillion (Page 11)

2
New cards

What are the three key characteristics of cyberspace?

Borderless, Ubiquitous, Lawless (Page 4)

3
New cards

What percentage of data breaches involve weak, default, or stolen passwords?

63% (Page 17)

4
New cards

What was the consequence of CrowdStrike's antivirus update in Singapore?

IT crash affecting airlines and banks (Page 5)

5
New cards

Name two cyber defense commands established by SAF.

Defence Cyber Command (DCCOM) and SAF C4 & Digitalisation Command (SAFC4DC) (Page 5)

6
New cards

What type of cyber attack targeted the 2016 US presidential election?

Subversion (Page 14)

7
New cards

What encryption standard is used in GoldenEye ransomware?

Military-grade (implied to be AES) (Page 18)

8
New cards

What was the average ransom demand in 2024?

$2.73 million (Page 21)

9
New cards

How long is the average downtime after a ransomware attack?

24 days (Page 21)

10
New cards

What caused Sweden's Transport Agency data leak?

Misconfigured cloud systems (Page 16)

11
New cards

What percentage of organizations recover encrypted data after paying ransoms?

97% (Page 21)

12
New cards

How many records were exposed in the Capital One breach?

100 million credit card applications/accounts (Page 8)

13
New cards

What type of data did Wells Fargo accidentally leak?

Wealthy clients' financial records (Page 15)

14
New cards

Which IoT device was hacked to act as a covert microphone?

Amazon Echo (Page 23)

15
New cards

How are ransomware decryption keys typically delivered?

Via Darknet/Tor pages (Page 18)

16
New cards

What was the true goal of the NotPetya attack?

Destruction, not profit (disguised as ransomware) (Page 19)

17
New cards

Which Singaporean institution leaked 4,000 personal records in 2013?

Singapore Art Museum (SAM) (Page 16)

18
New cards

What accidental data exposure occurred at Wells Fargo in 2017?

Wealthy client data in an Excel spreadsheet (Page 15)

19
New cards

What enables hackers to remotely access connected cars?

Software vulnerabilities in vehicle systems (Page 25)

20
New cards

What is a major risk of ungoverned cyberspace?

Lawlessness and unchecked threats (Page 6)

21
New cards

What attack method uses targeted phishing emails?

Subversion (e.g., DNC hack) (Page 14)

22
New cards

Which cloud provider misconfiguration caused the Dow Jones leak?

Amazon Web Services (AWS) (Page 16)

23
New cards

What tactic breached the DNC's emails in 2016?

Spear-phishing (Page 14)

24
New cards

What was the reported increase in ransomware attacks?

36% (Page 20)

25
New cards

Which device's flaws allowed home security systems to be disabled remotely?

IoT-connected burglar alarms (Page 23)