Cybersecurity Overview – Chapter I

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

flashcard set

Earn XP

Description and Tags

35 question-and-answer flashcards covering definitions, examples, attacker profiles, personal and organizational data, CIA triad, breach impacts, and cyberwarfare concepts from Chapter I of the Cybersecurity Overview lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

What is cybersecurity?

The practice of protecting systems, networks, and programs from digital attacks aimed at accessing, changing, or destroying information, extorting money, or interrupting normal business processes.

2
New cards

Why is cybersecurity no longer just an IT department’s responsibility?

Because widespread connectivity and data-driven services expose everyone to risk; every employee’s actions can create or mitigate vulnerabilities.

3
New cards

Name three factors that have increased the importance of cybersecurity.

1) Pervasive high-speed connectivity (e.g., fibre broadband, smartphones) 2) Cloud-hosted data and services 3) Growing system vulnerabilities and sophisticated attacks.

4
New cards

Give two real-world examples of large-scale ransomware incidents.

Wannacry (global, 2017) and the attack that crippled the UK National Health Service (NHS).

5
New cards

How many user records were exposed in Facebook’s Amazon S3 breach?

Over 540 million user records.

6
New cards

Which credit agency’s 2017 breach affected 147 million customers and cost roughly $439 million in recovery?

Equifax.

7
New cards

What is the significance of Yahoo’s 2013 breach?

It compromised all three billion customer accounts, illustrating massive reputational and financial damage from breaches.

8
New cards

What key vulnerability was found at a German nuclear plant in 2016?

Malware infected the monitoring system, allowing remote access to the plant’s network.

9
New cards

List two high-level categories of assets cybersecurity aims to protect.

1) Integrity of critical information systems (e.g., power plants, financial systems) 2) Data—personal, organizational, and big-data analytics.

10
New cards

Why has the growth of data analytics created career opportunities in cybersecurity?

Organizations rely on vast data sets for business value, increasing demand for professionals who can secure that data against misuse and breaches.

11
New cards

Define ‘Personal Data’.

Any data that can identify an individual, such as NRIC numbers, medical records, financial information, and online credentials.

12
New cards

When is it appropriate to provide your NRIC (national ID) number?

When accurate identification is legally required, e.g., healthcare, real-estate transactions, mobile phone contracts, employment, or pre-school entry.

13
New cards

Give three situations where you should NOT provide your NRIC number.

Buying movie tickets, entering contests/lucky draws, or renting a bicycle.

14
New cards

Differentiate between offline and online identity.

Offline identity is who you are in physical settings (home, school, work); online identity is your presence in cyberspace, usually via a username that should reveal minimal personal info.

15
New cards

List three categories of personal data often targeted by criminals.

1) Medical records, 2) Education records, 3) Employment and financial records.

16
New cards

Where might your medical records be stored?

At your doctor’s office and with your insurance company.

17
New cards

Why do criminals steal identities? Name two motives.

For long-term profits such as filing fake tax returns, opening credit cards, obtaining loans, or gaining medical benefits.

18
New cards

What are three traditional types of organizational data?

Personnel data, intellectual property, and financial data.

19
New cards

Define the ‘Internet of Things (IoT)’ in an organizational context.

A large network of physical devices (sensors, machinery, etc.) connected to collect and share data.

20
New cards

What is ‘Big Data’?

Massive data sets generated from sources like the IoT, requiring advanced analytics for insight.

21
New cards

Explain the ‘CIA triad’.

Core security principles: Confidentiality (privacy), Integrity (accuracy/trustworthiness), and Availability (accessible information).

22
New cards

Give four potential consequences of a security breach to an organization.

Ruined reputation, revenue loss, theft of intellectual property, and operational vandalism.

23
New cards

What data was stolen in the LastPass breach, and what mitigation was required?

Email addresses, password reminders, and authentication hashes; users needed email verification or MFA and strong, regularly changed master passwords.

24
New cards

Why was the Vtech breach particularly concerning?

It exposed children’s data (names, photos, chat logs), enabling identity theft and possible takeover of parents’ online accounts.

25
New cards

What flaw enabled the 2017 Equifax breach?

An unpatched vulnerability in web-application software (Apache Struts).

26
New cards

Define ‘script kiddie’.

An amateur attacker with little skill who uses pre-made tools or scripts found online.

27
New cards

Contrast white-hat, gray-hat, and black-hat hackers.

White-hats hack with permission to improve security; gray-hats hack without permission but often without malicious intent; black-hats exploit vulnerabilities for illegal gain.

28
New cards

Who are ‘organized hackers’?

Groups such as cyber-criminal syndicates, hacktivists, terrorists, and state-sponsored teams working toward common malicious goals.

29
New cards

Give two examples of internal security threats.

Employees mishandling confidential data or plugging infected USB drives into corporate systems.

30
New cards

What is a common external threat technique?

Exploiting network/device vulnerabilities or using social engineering to gain access.

31
New cards

Define cyberwarfare.

Conflict conducted in cyberspace to damage, disrupt, or manipulate another nation’s information systems and infrastructure.

32
New cards

Name the malware widely cited as the first true cyberweapon and its target.

Stuxnet, designed to damage Iran’s nuclear enrichment facility.

33
New cards

List three strategic purposes of cyberwarfare.

Sabotaging critical infrastructure, blackmailing government personnel, and eroding public confidence in a nation’s leadership.

34
New cards

Why can’t every cyberattack be prevented?

Attackers continually discover new vulnerabilities; perfect protection is infeasible, so focus is on risk management and rapid response.

35
New cards

According to the lecture, who is the ‘first line of defence’ in cybersecurity?

You—the individual user or employee responsible for safe practices.