Last saved 24 days ago

INFO ASSURANCE PRELIMS


Cybersecurity - is a practice of protecting systems, networks, and programs from digital attacks.


Security Architect – This individual is responsible for maintaining the security of a company’s computer system.

Security Consultant – S/He works as an advisor and supervisor for all security measures necessary to protect a company or client’s assets effectively.

Ethical Hacker – Also referred to as a white hat hacker.

Chief Information Security Officer (CISO) – This person is responsible for an organization’s information and data security.


THE ANATOMY OF CYBERATTACK

Step 1: Reconnaissance Hackers - usually start by researching and gathering information about the target organization. They look for network ranges, IP addresses, and domain names.

Step 2: Attack - After getting access to the network, hackers proceed with infiltrating the organization’s network.

Step 3: Expansion - Hackers intrude all systems on the network using malicious programs.

Step 4: Obfuscation - Hackers proceed to hiding their tracks to mask the origins of the attack



Ransomware - is a type of malicious software designed to extort money by blocking access to files or the computer system until the ransom is paid

Malware - is a type of software designed to gain unauthorized access or cause damage to a computer.

Social engineering - is a tactic that adversaries use to trick a user into revealing sensitive information.

Phishing - is the practice of sending fraudulent e-mails that resemble e-mails from reputable sources.

Crypting services - are used for encrypting malware to obscure and make the data difficult to detect.

Crimeware - is the buying and selling of malware on the “Dark Web,” a black market for cyber criminals

Remote administration tools - are a type of malware that, once activated, grants hackers control over the infected computer.

Keyloggers - are malware that tracks keystrokes, enabling the attacker to eavesdrop on confidential conversations and steal login credentials.

Exploit kits - work by targeting users who think they are visiting a trusted site but then get redirected to a malicious site.

Leaked data - are data stolen from a user’s machine that can easily be sold on the Dark Web

Card skimmers - are implanted in places like Point-of-Sale (POS) machines, bank teller machines, and gas pumps to steal identity and credit card account data.

Unpatched systems – A great proportion of cybersecurity vulnerabilities can be resolved through the application of software patches.



Hardware authentication - is a well-known fact that a majority of data users’ passwords and usernames are weak.

Cloud technology - is set to have a significant impact on the transformation of systems security technology.

Deep learning - encompasses some technologies like machine learning and artificial intelligence
















robot
knowt logo

INFO ASSURANCE PRELIMS

Cybersecurity - is a practice of protecting systems, networks, and programs from digital attacks.

Security Architect – This individual is responsible for maintaining the security of a company’s computer system.

Security Consultant – S/He works as an advisor and supervisor for all security measures necessary to protect a company or client’s assets effectively.

Ethical Hacker – Also referred to as a white hat hacker.

Chief Information Security Officer (CISO) – This person is responsible for an organization’s information and data security.

THE ANATOMY OF CYBERATTACK

Step 1: Reconnaissance Hackers - usually start by researching and gathering information about the target organization. They look for network ranges, IP addresses, and domain names.

Step 2: Attack - After getting access to the network, hackers proceed with infiltrating the organization’s network.

Step 3: Expansion - Hackers intrude all systems on the network using malicious programs.

Step 4: Obfuscation - Hackers proceed to hiding their tracks to mask the origins of the attack

Ransomware - is a type of malicious software designed to extort money by blocking access to files or the computer system until the ransom is paid

Malware - is a type of software designed to gain unauthorized access or cause damage to a computer.

Social engineering - is a tactic that adversaries use to trick a user into revealing sensitive information.

Phishing - is the practice of sending fraudulent e-mails that resemble e-mails from reputable sources.

Crypting services - are used for encrypting malware to obscure and make the data difficult to detect.

Crimeware - is the buying and selling of malware on the “Dark Web,” a black market for cyber criminals

Remote administration tools - are a type of malware that, once activated, grants hackers control over the infected computer.

Keyloggers - are malware that tracks keystrokes, enabling the attacker to eavesdrop on confidential conversations and steal login credentials.

Exploit kits - work by targeting users who think they are visiting a trusted site but then get redirected to a malicious site.

Leaked data - are data stolen from a user’s machine that can easily be sold on the Dark Web

Card skimmers - are implanted in places like Point-of-Sale (POS) machines, bank teller machines, and gas pumps to steal identity and credit card account data.

Unpatched systems – A great proportion of cybersecurity vulnerabilities can be resolved through the application of software patches.

Hardware authentication - is a well-known fact that a majority of data users’ passwords and usernames are weak.

Cloud technology - is set to have a significant impact on the transformation of systems security technology.

Deep learning - encompasses some technologies like machine learning and artificial intelligence