Info Assurance Lesson 9 - Becoming a Cybersecurity Specialist

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

User Domain

It includes the users who access the organization's information system

2
New cards

Users

are often the weakest link in the information security systems and pose a significant threat to the confidentiality, integrity, and availability of the organization's data.

3
New cards

Ethics

It is the little voice in the background guiding a cybersecurity specialist as to what he should or should not do, regardless of whether it is legal.

4
New cards

cybersecurity specialist

The organization entrusts the _______________________________________________ with the most sensitive data and resources.

5
New cards

Computer Ethics Institute

It is a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.

6
New cards

Computer Ethics Institute

It was one of the first organizations to recognize the ethical and public policy issues arising from the rapid growth of the information technology field.

7
New cards

Laws

It prohibit undesired behaviors.

8
New cards

faster

Unfortunately, the advancements in information system technologies are much __________________ than the legal system can accommodate.

9
New cards

cyberspace

A number of laws and regulations affect ________________________________.

10
New cards

computer-assisted crime,

computer targeted crime,

computer-incidental crime

A computer may be involved in a cybercrime in a couple of different ways. There is _____________________________________, ________________________________________, and ___________________________________.

11
New cards

Child pornography

is an example of computer-incidental crime; the computer is a storage device and is not the actual tool used to commit the crime

12
New cards

Department of Justice

In the Philippines, the _____________________________________________ have established the Office of Cybercrime, which functions under R.A. No. 10175or the Cybercrime Prevention Act of 2012.

13
New cards

Office of Cybercrime

In the Philippines, the Department of Justice have established the __________________________________, which functions under R.A. No. 10175or the Cybercrime Prevention Act of 2012.

14
New cards

R.A. No. 10175

In the Philippines, the Department of Justice have established the Office of Cybercrime, which functions under ____________________________ or the Cybercrime Prevention Act of 2012.

15
New cards

Cybercrime Prevention Act of 2012

In the Philippines, the Department of Justice have established the Office of Cybercrime, which functions under R.A. No. 10175 or the ___________________________________________________.

16
New cards

Central Authority

OOC was designated as the ________________________________ in all matters relating to international mutual assistance and extradition for cybercrime and cyber-related matters.

17
New cards

statutory law,

administrative law,

common law

In the United States, there are three primary sources of laws and regulations: ______________________________, ________________________________, and _________________________________. All three sources involve computer security.

18
New cards

federal

The U.S. Congress established ___________________ administrative agencies and a regulatory framework that includes both civil and criminal penalties for failing to follow the rules.

19
New cards

National Vulnerability Database (NVD)

is a U.S. government repository of standards-based vulnerability management data that uses the Security Content Automation Protocol (SCAP).

20
New cards

CERT

The Software Engineering Institute (SEI) at Carnegie Mellon University helps government and industry organizations to develop, operate, and maintain software systems that are innovative, affordable, and trustworthy. It is a Federally Funded Research and Development Center sponsored by the U.S. Department of Defense.

21
New cards

Internet Storm Center

provides a free analysis and warning service to Internet users and organizations. It also works with Internet Service Providers to combat malicious cyber criminals. The Internet Storm Center gathers millions of log entries from intrusion detection systems every day using sensors covering 500,000 IP addresses in over 50 countries.

22
New cards

The Advanced Cyber Security Center (ACSC)

is a non-profit organization that brings together industry, academia, and government to address advanced cyber threats. The organization shares information on cyber threats, engages in cybersecurity research and development, and creates education programs to promote the cybersecurity profession.

23
New cards

Vulnerability Scanners

assess computers, computer systems, networks, or applications for weaknesses. It help to automate security auditing by scanning the network for security risks and producing a prioritized list to address weaknesses.

24
New cards

Penetrating Testing (or pen testing)

is a method of testing the areas of weaknesses in systems by using various malicious techniques

25
New cards

Vulnerability testing

This testing just identifies potential problems.

26
New cards

Pen testing

This testing involves a cybersecurity specialist who hacks a website, network, or server with the organization's permission to try to gain access to resources without the knowledge of usernames, passwords, or other normal means.

27
New cards

Packet Analyzers (or packet sniffers)

It intercept and log network traffic. It captures each packet, shows the values of various fields in the packet, and analyzes its content.

28
New cards

T

T or F:

A sniffer can capture network traffic on both wired and wireless networks

29
New cards

Security Tools

There is no one size fits all when it comes to this. Much depends on the situation, circumstance, and personal preference. A cybersecurity specialist must know where to go to get sound information

30
New cards

Indeed,

CareerBuilder,

USAJobs

A variety of websites and mobile applications advertise information technology jobs. Each site targets varying job applicants and provides different tools for candidates researching their ideal job position:

• ____________________.com

•_____________________.com

• _____________________.gov