Week 1: basics & threat sources

0.0(0)
studied byStudied by 2 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

What does the C.I.A of cybersecurity stand for?

Confidentiality, Integrity, Availability

2
New cards

What does each letter mean in CIA?

confidentiality: preventing unauthorized reading

integrity: prevent unauthorized writing

availability: ensure authorized reading/writing

3
New cards

What does the practice of cybersecurity focus on?

evaluating risks and deploying safeguards to reduce those risks

4
New cards

What is a violation of policy, procedure, standard, safeguard or configuration?

a security incident

5
New cards

What is a violation of the CIA of data?

a compromise

6
New cards

Is it called a compromise when confidentiality violated?

No, it is a data breach

7
New cards

T/F: A security incident doesn’t always result in a compromise of data.

True, it does not

8
New cards

Information security as a primary component of a __-term business strategy
a) long

b) short

a) long

9
New cards

To properly apply safeguards, what do you “truly” have to understand?

understand the threats and vulnerabilities on a per “asset” basis

10
New cards

Give an example of an asset, something of value to an organization.

  • a set of data (a file)

  • a system storing data (a server)

  • a person handling data

11
New cards

What are malicious outsiders and their goals?

attackers with no authorization to a system or organization; account for majority of modern attacks

goal is to become a privileged user

12
New cards

What are main characteristics of black hat attackers/hackers?

highly skilled but lack ethics and violates laws by breaking into systems;

historically the primary threat type, its organized crime modern day

13
New cards

What are gray hat hackers?

Black or white hat hackers that discover and publicizes vulnerabilities.

14
New cards

What are 2 examples of APT(advanced persistent threat) groups?

APT 29 (cozy bear) or APT35 (charming kitten)