Basics of Cybersecurity: Threats & Vulnerabilities

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of attack is characterized by overwhelming a system with excessive traffic?

  • Denial-of-Service Attack (correct)
  • Man-in-the-Middle Attack
  • Supply Chain Attack
  • Social Engineering Attack

What is one of the main risks associated with social engineering attacks?

  • Unintentional disclosure of sensitive information (correct)
  • Degradation of hardware performance
  • Loss of physical equipment
  • Inability to detect malware

In which type of attack does malicious input potentially expose sensitive information within a web application?

  • Supply Chain Attacks
  • Malware Attacks
  • Injection Attacks (correct)
  • Man-in-the-Middle Attacks

Which of the following describes a significant vulnerability created by system misconfigurations?

<p>Vulnerabilities due to incompatible security settings (B)</p> Signup and view all the answers

What primarily enables attackers to exploit systems effectively?

<p>Outdated or unpatched software (A)</p> Signup and view all the answers

Which of the following best describes a supply chain attack?

<p>Infection of legitimate applications without the vendor's knowledge (A)</p> Signup and view all the answers

What is a consequence of a successful Man-in-the-Middle Attack?

<p>Compromising sensitive communications between parties (D)</p> Signup and view all the answers

Which of these is not categorized as a type of malware?

<p>Phishing (A)</p> Signup and view all the answers

What is the primary purpose of a patch management strategy?

<p>To apply recent system updates (A)</p> Signup and view all the answers

Which statement accurately defines the concept of data privacy?

<p>Data privacy focuses on controlling who has access to specific data. (D)</p> Signup and view all the answers

What are zero-day vulnerabilities?

<p>Weaknesses in systems identified by attackers before the user (D)</p> Signup and view all the answers

Which principle supports ensuring users can access data required for business functions?

<p>Data Availability (A)</p> Signup and view all the answers

What challenge is associated with malicious insider threats within an organization?

<p>They often manipulate actions to appear genuine. (D)</p> Signup and view all the answers

Data protection refers to which of the following?

<p>The strategic steps to safeguard sensitive data (B)</p> Signup and view all the answers

How does missing or weak data encryption affect an organization?

<p>It can lead to the exposure of misleading information. (A)</p> Signup and view all the answers

What aspect of data lifecycle management is emphasized in the protection of data?

<p>Automating data transmission to various storage (D)</p> Signup and view all the answers

What primary function does Information Lifecycle Management serve regarding information assets?

<p>Valuating, cataloging, and protecting information assets (A)</p> Signup and view all the answers

Which of the following laws is primarily concerned with safeguarding personal data in the Philippines?

<p>Data Privacy Act of 2012 (RA No. 10173) (A)</p> Signup and view all the answers

What is a key ethical responsibility of cybersecurity professionals?

<p>To follow codes of conduct to maintain integrity (B)</p> Signup and view all the answers

Which act specifically addresses incidents of online sexual abuse or exploitation of children in the Philippines?

<p>Anti-Online Sexual Abuse or Exploitation of Children Act (RA No. 11930) (D)</p> Signup and view all the answers

What potential consequences might organizations face due to security negligence?

<p>Penalties and legal liability (A)</p> Signup and view all the answers

What does ethical hacking require prior to conducting security tests?

<p>Permission from the entity being tested (D)</p> Signup and view all the answers

What should organizations balance when monitoring for security purposes?

<p>Security requirements with privacy rights (D)</p> Signup and view all the answers

What does the Cybercrime Prevention Act of 2012 primarily focus on?

<p>Addressing cybercrime and promoting cybersecurity (C)</p> Signup and view all the answers

What distinguishes Narrow AI from General AI?

<p>General AI can handle complex tasks beyond human capabilities. (C)</p> Signup and view all the answers

Which type of AI is characterized by the inability to store memories or use past experiences in decision-making?

<p>Reactive Machines (A)</p> Signup and view all the answers

Which type of AI is currently not in existence but predicts the potential to understand human emotions?

<p>Theory of Mind (C)</p> Signup and view all the answers

What is a key feature of Limited Memory AI?

<p>It can store and utilize previous data for decision-making. (C)</p> Signup and view all the answers

IBM’s Deep Blue is an example of which type of AI?

<p>Reactive Machines (D)</p> Signup and view all the answers

What is the primary function of Reactive Machines?

<p>To carry out simplistic tasks in real-time (C)</p> Signup and view all the answers

Which of the following applications exemplifies the capabilities of Limited Memory AI?

<p>A self-driving car (B)</p> Signup and view all the answers

What is a notable benefit of using cryptocurrencies over traditional banking systems?

<p>Elimination of third parties (C)</p> Signup and view all the answers

Which of the following is NOT considered a challenge in the use of cryptocurrencies?

<p>Improved accuracy (B)</p> Signup and view all the answers

What characteristic of Self-aware AI is unique compared to other types of AI?

<p>It possesses a form of self-awareness. (D)</p> Signup and view all the answers

What is one of the potential negative implications of the pseudonymous nature of cryptocurrency transactions?

<p>Facilitation of criminal activities (A)</p> Signup and view all the answers

Which financial technology application is specifically designed to help consumers manage their investments automatically?

<p>Robinhood (C)</p> Signup and view all the answers

What characteristic of cryptocurrencies contributes to their price volatility?

<p>High demand coupled with limited supply (B)</p> Signup and view all the answers

In the context of financial technology, which of the following applications is primarily used for peer-to-peer transactions?

<p>Block (Square) (B)</p> Signup and view all the answers

Which of the following statements accurately describes fintech?

<p>It encompasses digital innovations that enhance financial services. (D)</p> Signup and view all the answers

What type of applications do personal finance tools like Mint provide?

<p>Overview of finances and budgeting capabilities (C)</p> Signup and view all the answers

What is the penalty for a person found guilty of section 4(c)(3)?

<p>PhP50,000.00 to PhP250,000.00 (A)</p> Signup and view all the answers

Which factor does NOT contribute to the digital divide?

<p>Cultural inclusiveness of digital platforms (D)</p> Signup and view all the answers

What primary advantage of technology in education is mentioned in the context?

<p>Gamified learning and personalized approaches (C)</p> Signup and view all the answers

For which of the following does the penalty increase by one degree according to the regulations?

<p>Section 4(c)(2) (C)</p> Signup and view all the answers

Which statement about the digital divide is true?

<p>It encompasses disparities in access and digital literacy. (D)</p> Signup and view all the answers

What is a common concern raised regarding the legal framework around technology?

<p>Privacy issues surrounding personal data can arise. (A)</p> Signup and view all the answers

What is the purpose of MOOCs like edX and Coursera?

<p>To democratize education and make it accessible globally. (C)</p> Signup and view all the answers

Which aspect is NOT considered an advantage of cybersecurity?

<p>Reduction of the digital divide (C)</p> Signup and view all the answers

Flashcards

Malware Attacks

Cyberattacks using malicious software like viruses, worms, trojans, spyware, and ransomware.

Social Engineering

Tricking people to give up sensitive info like passwords.

Supply Chain Attacks

Attacking legitimate software vendors to infect applications.

Man-in-the-Middle Attack

Intercepting communication between two parties.

Signup and view all the flashcards

Denial-of-Service Attack

Overloading a system with traffic to stop normal operations.

Signup and view all the flashcards

Injection Attacks

Inserting malicious input into a web application to steal data.

Signup and view all the flashcards

System Misconfigurations

Security mistakes in network settings allowing attackers to exploit the system.

Signup and view all the flashcards

Outdated/Unpatched Software

Software with known vulnerabilities that attackers can exploit.

Signup and view all the flashcards

Patch Management Strategy

A plan for applying recent system updates to ensure security.

Signup and view all the flashcards

Weak Authorization

Passwords that are easily guessed, leading to unauthorized access.

Signup and view all the flashcards

Insider Threats

Employees with access to systems who misuse or share access inappropriately.

Signup and view all the flashcards

Data Encryption

Protecting sensitive information by converting it into an unreadable format.

Signup and view all the flashcards

Zero-Day Vulnerabilities

Software flaws unknown to users, but known to attackers.

Signup and view all the flashcards

Data Privacy

Who has access to data, focused on user control.

Signup and view all the flashcards

Data Protection

Company's responsibility to keep data private and secure.

Signup and view all the flashcards

Data Availability

Ensuring users can access required data even when lost or damaged.

Signup and view all the flashcards

Information Lifecycle Management (ILM)

Planning, managing, and eventual disposal of information assets, including valuation, cataloging, and protection.

Signup and view all the flashcards

Data Privacy Laws

Regulations ensuring the protection of personal data, like GDPR, CCPA (in some areas, examples) ensuring compliance.

Signup and view all the flashcards

Intellectual Property (IP) Protection

Measures to prevent unauthorized access and ensure the rights of IP creators are respected, like patents, copyrights.

Signup and view all the flashcards

Legal Liabilities (Cybersecurity)

Potential penalties for negligence in cybersecurity practices.

Signup and view all the flashcards

Ethical Hacking

Hacking with explicit permission to assess vulnerabilities and prevent malicious attacks.

Signup and view all the flashcards

Cybercrime

Crimes committed using computer networks, including hacking and identity theft.

Signup and view all the flashcards

Cybersecurity Professional Ethics

Codes of conduct to maintain integrity, responsibility, and respect in cybersecurity practices.

Signup and view all the flashcards

Incident Reporting Obligations

Requirement to report data breaches to relevant authorities promptly.

Signup and view all the flashcards

Digital Divide

Gap in access, use, and skills related to ICT (Information and Communication Technologies).

Signup and view all the flashcards

Section 4(a)(5) Penalty

PhP500,000.00 fine for a specific offense.

Signup and view all the flashcards

Section 4(c)(1) Penalty

PhP200,000.00 - PhP1,000,000.00 fine range for a particular offense.

Signup and view all the flashcards

Section 4(c)(3) Penalty

PhP50,000.00 - PhP250,000.00 fine range for a particular offense.

Signup and view all the flashcards

Section 4(c)(2) Penalty

Penalty one degree higher than Republic Act No. 9775.

Signup and view all the flashcards

Cybersecurity Enhancement

Improving protection against cyberattacks.

Signup and view all the flashcards

Protection of Individuals

Ensuring the safety and privacy of individuals online.

Signup and view all the flashcards

Digital Literacy

Skills and knowledge to effectively use ICTs.

Signup and view all the flashcards

Narrow AI

Artificial intelligence designed for a single task.

Signup and view all the flashcards

General AI

Artificial intelligence with human-like capabilities.

Signup and view all the flashcards

Reactive Machines

AI that reacts to immediate input, with no memory.

Signup and view all the flashcards

Limited Memory AI

AI that uses past data to predict the future.

Signup and view all the flashcards

Theory of Mind AI

AI that understands and responds to human emotions.

Signup and view all the flashcards

Self-Aware AI

AI with self-awareness, a sense of self.

Signup and view all the flashcards

AI Types

Different categories of Artificial Intelligence (Narrow, General).

Signup and view all the flashcards

4 Kinds of AI

Categories of AI algorithms with various capabilities, Reactive, Limited Memory, Theory of Mind, Self-Aware.

Signup and view all the flashcards

Cryptocurrency Advantages

Cryptocurrency offers benefits like removing intermediaries, easier fund transfer, and potential returns.

Signup and view all the flashcards

Cryptocurrency Disadvantages

Cryptocurrency has issues like pseudonymous transactions, potential for criminal use, and high participation costs.

Signup and view all the flashcards

FinTech Definition

Financial Technology uses innovation to improve financial services, like mobile payments and robo-advisors.

Signup and view all the flashcards

Data Alteration Alert System

A system designed to alert participants to any attempts to modify data, revealing the perpetrator.

Signup and view all the flashcards

Data Alteration Benefits

Data modification alerts lead to increased security, accuracy, and efficiency.

Signup and view all the flashcards

Data Alteration Challenges

Data modification alerts might limit transactions, increase energy use, and have scalability issues.

Signup and view all the flashcards

Robo-advisors

Apps that automatically invest money based on user preferences.

Signup and view all the flashcards

Investment Apps

Apps facilitating the buying and selling of stocks, ETFs, and cryptocurrency.

Signup and view all the flashcards

Study Notes

Basics of Cybersecurity: Threats and Vulnerabilities

  • Cyber threats originate from individuals aiming to steal data or damage systems.
  • Malware attacks involve malicious software (viruses, worms, trojans, spyware, ransomware).
  • Effects of malware include data collection, network manipulation, and data destruction.
  • Social engineering manipulates individuals to provide access for malware.
  • Phishing, baiting, pretexting, vishing, smishing, piggybacking, and tailgating are social engineering techniques.
  • Supply chain attacks target legitimate applications, potentially infecting software from vendors.
  • Man-in-the-Middle attacks intercept communications, eavesdropping or impersonating parties.
  • Denial-of-Service attacks overwhelm a system with traffic, hindering functionality.
  • HTTP flood DDoS and SYN flood DDoS are denial-of-service techniques.
  • Injection attacks insert malicious input into web applications, potentially exposing sensitive information.
  • Cross-Site Scripting (XSS) is an example of an injection attack.

Types of Cybersecurity Vulnerabilities

  • System misconfigurations can cause security mistakes in network assets.
  • Cybercriminals exploit vulnerabilities in security settings to gain access.
  • Outdated or unpatched software is easily exploited by attackers.
  • Patch management strategies are crucial to ensure systems are updated regularly.
  • Missing or weak authorization credentials allow attackers to guess passwords and access systems.
  • Malicious insider threats are posed by employees with access to critical systems.
  • Missing or poor data encryption makes sensitive data vulnerable to interception.

Data Privacy and Protection

  • Data privacy focuses on who can access data, often controlled by the user.
  • Data protection is the company's responsibility to ensure data privacy.
  • Data privacy guidelines dictate how data should be collected and handled.
  • Data protection involves procedural steps to safeguard sensitive data.
  • Principles of data protection include data availability, lifecycle management, and information protection.
  • Compliance with laws like GDPR and CCPA is crucial to protect personal data.
  • Protecting intellectual property prevents unauthorized access and ensures rights are respected.
  • Legal liability exists for organizations negligent in security.
  • Ethical hackers must obtain permission to perform penetration testing and security audits.
  • Cybersecurity professionals must comply with codes of conduct to ensure integrity and responsibility.
  • Surveillance and monitoring should balance security with privacy rights to inform individuals.

Zero-Day Vulnerabilities

  • These are software flaws known to attackers but not yet identified by users.
  • Attackers can exploit these vulnerabilities to infiltrate systems undetected.

Incident Reporting Obligations

  • Timely reporting of data breaches is mandatory by regulations.
  • Laws exist to combat hacking, identity theft, and other cybercrimes.

Cybersecurity Legislation in the Philippines

  • Various acts including RA No. 11967, RA No. 8792, RA No. 11930, RA No. 8484, RA No. 9995, RA No. 11934, RA No. 11202, and RA No. 9775 address cybercrimes, and RA No. 10173 addresses data privacy.
  • Specific penalties exist for violations depending on the act violated.

IT and Society: Digital Divide

  • The digital divide refers to inequalities in access, use, and skills related to information and communication technologies.
  • Geographical disparities, economic barriers, education and literacy limitations, and cultural and language barriers contribute to the digital divide.

IT in Education and Learning

  • Technology extends beyond online classes to include gamified learning, AI-driven personalization, VR, and data analytics.

Innovations in E-learning

  • Massive Open Online Courses (MOOCs) democratize access to education from top institutions.
  • Virtual classrooms and collaboration tools enhance accessibility and real-time interaction.
  • AI in education personalizes lessons based on individual progress (DreamBox, Khan Academy)

Opportunities

  • Digital tools promote inclusivity, allowing students from diverse backgrounds to engage.
  • These tools support teacher-student interaction and provide access to global experiences.

Challenges

  • Concerns regarding data privacy remain important.
  • Digital fatigue and inequality in access are ongoing issues, particularly for lower-income countries.

Impact of IT on Culture and Social Interactions

  • Digital communication platforms have reshaped social interactions, leading to increased awareness of global issues, greater connectivity, and more opportunities for self-expression.
  • Cyberbullying, misinformation, and polarization are also negative consequences of these platforms.

Emerging Technologies

  • Emerging technology is a term generally used to describe a new technology, continuing development of an existing technology, or the varying interpretations of a technology based on its use case.

Artificial Intelligence (AI)

  • AI involves developing computers and robots that behave in ways that mimic or surpass human capabilities.
  • Narrow or Weak AI carries out specific tasks (e.g., personal assistants).
  • General AI is complex and human-like in capabilities (e.g., self-driving cars).
  • Reactive machines perceive the world but don't store memory or rely on past experience.
  • Limited memory AI has limited memory but gathers data to make decisions.
  • Theory of mind and self-aware AI are hypothetical AI types that have not been realized.

AI Benefits and Disadvantages

  • AI benefits include automating tasks, solving complex problems, improving customer experiences, accelerating healthcare, and reducing human error.
  • Disadvantages include job displacement, bias and discrimination, hallucinations, and privacy and ethical concerns.

AI Applications and Examples

  • Applications include healthcare, retail, customer service, manufacturing, finance, and marketing.
  • Examples include generative AI tools, smart assistants, self-driving cars, wearables, and visual filters.

Machine Learning (ML)

  • Machine learning teaches computers to learn from data without explicit programming.
  • Deep learning uses sophisticated neural networks for advanced predictive analytics.
  • Categories of ML include supervised, unsupervised, reinforcement, and semi-supervised learning.

ML Benefits and Risks

  • Benefits include lower operational costs, improved efficiency, and better insights.
  • Risks include job displacement, bias/discrimination, and ethical concerns.

ML Applications

  • Applications include speech recognition, customer service, computer vision, recommendation systems, and more.

Big Data

  • Big data refers to massive and complex data sets that can't be easily managed using conventional tools.
  • Characteristics are often described by the "5 Vs": volume, velocity, variety, veracity, and value.
  • Big data benefits include better insights, decision-making, personalization, and efficiency improvements.
  • Uses are present in retail, healthcare, financial services, manufacturing, and more.

Data Analytics

  • Data analytics involves collecting, organizing, and transforming data to inform decisions.
  • Types of data analytics include descriptive, diagnostic, predictive, and prescriptive analytics.

Blockchain Technology

  • Blockchain is a decentralized ledger of data shared securely among participants.
  • Using cloud services enables easy data integration and sharing of transactional data from multiple sources.
  • Prevents alteration and data tampering because data can't be modified without consensus from participants.

Cryptocurrency

  • Cryptocurrencies are digital payment systems independent of banks, enabling peer-to-peer transactions without intermediaries.
  • Transactions are recorded in a public ledger called a blockchain.
  • Cryptocurrency is stored in digital wallets.

Fintech

  • Fintech refers to using technology to improve and automate financial services.
  • Examples are robo-advisors, investment apps, payment apps, personal finance apps, P2P lending platforms, and crypto apps.
  • Insurtech is an example of leveraging technology in the insurance industry.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

GEE11 MIDTERM PDF

More Like This

Cyber Security Threats
10 questions

Cyber Security Threats

CelebratoryCommonsense avatar
CelebratoryCommonsense
Use Quizgecko on...
Browser
Browser