Computing Security: Concepts and Tools

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes network security?

  • A specific type of firewall used in enterprise environments.
  • The process of designing secure operating systems.
  • A set of guidelines for ethical hacking practices.
  • Controls, policies, and practices to prevent unauthorized access. (correct)

A security architect is primarily responsible for the physical security of a company's data centers.

False (B)

What is the main purpose of a penetration test?

  • To create and maintain security documentation.
  • To evaluate the security of a system by simulating a cyberattack. (correct)
  • To conduct a vulnerability assessment.
  • To install the latest security patches on a system.

A ______ triad consists of confidentiality, integrity, and availability.

<p>CIA</p>
Signup and view all the answers

Match the cyberattack type with its description:

<p>Malware = Software designed to disrupt systems or steal data. Phishing = Deceptive attempts to gain sensitive information via fake emails or messages. DDoS = Overwhelming a target with traffic to make it unavailable. Ransomware = Malware that encrypts data and demands payment for its release.</p>
Signup and view all the answers

What is the primary goal of Identity Access Management (IAM)?

<p>Connect users with the correct level of access.</p>
Signup and view all the answers

Which of the following describes the function of a Security Operations Center (SOC)?

<p>Monitoring, detecting, analyzing, and responding to cyber threats. (D)</p>
Signup and view all the answers

Security information and event management (SIEM) aims to decentralize log data related to security.

<p>False (B)</p>
Signup and view all the answers

A ______ is a support provider that monitors and maintains consistent security measures for a fee.

<p>MSSP</p>
Signup and view all the answers

What is the purpose of Cloud Access Security Brokers (CASB)?

<p>To manage and enforce security policies for cloud service users. (B)</p>
Signup and view all the answers

Match the term with its description:

<p>UEBA = Analysis to identify user behavior that deviates from normal. IOC = Network intrusion signals detected during log data analysis. DDoS = Disrupting a service by flooding it with traffic.</p>
Signup and view all the answers

What is the primary function of Wireshark?

<p>Packet analysis.</p>
Signup and view all the answers

Metasploit is a tool exclusively used by malicious hackers to exploit system vulnerabilities.

<p>False (B)</p>
Signup and view all the answers

What is the main focus when considering network security as akin to building a dam?

<p>The integrity of the entire structure. (C)</p>
Signup and view all the answers

The cyber threat landscape is a dynamic environment constantly evolving with new threats and attack ______.

<p>vectors</p>
Signup and view all the answers

Match the threat actor with their typical motivation:

<p>Hacktivists = Political or ideological reasons. Cybercriminals = Financial gain. State-Sponsored Actors = Strategic or intelligence-gathering purposes.</p>
Signup and view all the answers

What is a common consequence of a Distributed Denial of Service (DDoS) attack?

<p>Unavailability of the target</p>
Signup and view all the answers

Why is understanding the cyber threat landscape important for organizations?

<p>To allocate resources effectively and respond to cyber incidents. (A)</p>
Signup and view all the answers

Nonrepudiation in cryptography ensures data confidentiality.

<p>False (B)</p>
Signup and view all the answers

In symmetric encryption, the ______ key is used for both encryption and decryption.

<p>same</p>
Signup and view all the answers

Match each algorithm with its key length.

<p>DES = 56 bits Triple DES = 168 bits Blowfish = 448 bits</p>
Signup and view all the answers

What characteristic differentiates asymmetric cryptography from symmetric cryptography?

<p>Use of key pairs</p>
Signup and view all the answers

In public key infrastructure (PKI), what role does a Certificate Authority (CA) play?

<p>Issuing, managing, and revoking digital certificates. (D)</p>
Signup and view all the answers

A company's risk management framework should remain static and unchanged over time.

<p>False (B)</p>
Signup and view all the answers

Risk ______ involves defining the roles of all employees and assigning authority to individuals to manage risks.

<p>governance</p>
Signup and view all the answers

Match the risk type with its corresponding example:

<p>Strategic risk = A competitor entering the market. Compliance risk = Introduction of new regulations or legislation. Financial risk = Interest rate increase on a business loan.</p>
Signup and view all the answers

What makes remote workers a potential cybersecurity risk?

<p>Less-secure internet connections and human error</p>
Signup and view all the answers

Why are IoT (Internet of Things) devices considered a growing cybersecurity concern?

<p>They often have weak security and expose users to cyberattacks. (C)</p>
Signup and view all the answers

Multi-factor authentication (MFA) relies on only a single factor for verifying a user's identity.

<p>False (B)</p>
Signup and view all the answers

[Blank]-powered cybersecurity is capable of handling large volumes of data and assisting in rapid decisions to remediate threats.

<p>AI</p>
Signup and view all the answers

Match the definition to the term

<p>Cyberespionage = Gathering intelligence from a target using computers and the internet Malware = Sophisticated, malicious software designed to harm computer systems Ransomware = Malware that restricts access to a computer system and demands a ransom</p>
Signup and view all the answers

What is the primary goal of malware prevention?

<p>Combat ever-changing tactics</p>
Signup and view all the answers

What is the primary purpose of a firewall as a service (FWaaS)?

<p>Provide cost-effective and flexible security (B)</p>
Signup and view all the answers

Cybercrime investigators work exclusively for law enforcement agencies.

<p>False (B)</p>
Signup and view all the answers

One of the most important techniques used in cybercrime investigation is digital ______.

<p>forensics</p>
Signup and view all the answers

Match the tools to the function

<p>FTK = Digital Forensics Software Wireshark = Network Analysis Tools IDA Pro = Malware Analysis Tools</p>
Signup and view all the answers

What is the purpose of cybercrime investigation tools?

<p>Gather evidence</p>
Signup and view all the answers

According to the World Economic Forum (WEF), where does cybercrime rank in terms of global economic size?

<p>Third-largest (B)</p>
Signup and view all the answers

Incident management focuses solely on resolving technical issues and does not consider the impact on business services.

<p>False (B)</p>
Signup and view all the answers

The first step in the workflow of incident is to ______ the incident.

<p>identify</p>
Signup and view all the answers

Flashcards

Network security

Controls, policies, processes, and practices to prevent unauthorized access to network resources.

Security architect

Designs and maintains security for systems, recommends security controls, and identifies security solutions.

Endpoint security

Protecting devices like workstations and servers from malicious threats and cyberattacks.

Security engineer

Designs, develops, and maintains secure systems and networks, ensuring they are secure from attacks.

Signup and view all the flashcards

Penetration test

Authorized simulated cyberattack on a computer system to evaluate its security.

Signup and view all the flashcards

Security Operations Center (SOC)

A centralized function that monitors, detects, analyzes, and responds to cyber threats.

Signup and view all the flashcards

CIA triad

Three key tenets of cybersecurity: Confidentiality, Integrity, and Availability.

Signup and view all the flashcards

Confidentiality

Protecting data from unauthorized viewing or use.

Signup and view all the flashcards

Integrity

Maintaining accurate and complete information by protecting it from unauthorized alterations.

Signup and view all the flashcards

Availability

Ensuring data is accessible to authorized viewers.

Signup and view all the flashcards

Malware

Software created to disrupt a system or bypass security.

Signup and view all the flashcards

Phishing

Attacks to get login information using spam emails or false information.

Signup and view all the flashcards

Advanced Persistent Threats (APT)

Enduring and sophisticated attacks that rely on phishing or socially engineered malware.

Signup and view all the flashcards

Identity access management (IAM)

Policy framework for managing online user identities and access.

Signup and view all the flashcards

Incident response (IR)

Steps a company takes after detecting an intrusion.

Signup and view all the flashcards

Security information and event management (SIEM)

Centralizes all log data related to security for systematic analysis.

Signup and view all the flashcards

Managed security service provider (MSSP)

Support provider that monitors and maintains consistent security measures.

Signup and view all the flashcards

Cloud access security brokers (CASB)

Policy plans cloud service providers have with their users.

Signup and view all the flashcards

User and entity behavior analytics (UEBA)

Analysis to identify user behavior that deviates from normal use.

Signup and view all the flashcards

Indicator of compromise (IOC)

Network intrusion signals.

Signup and view all the flashcards

Distributed denial of service (DDoS)

Using DDoS to divert security measures during an attack.

Signup and view all the flashcards

Wireshark

Free, open-source packet analyzer for network troubleshooting and analysis.

Signup and view all the flashcards

Metasploit

Open-source tool to identify weaknesses in computer systems.

Signup and view all the flashcards

Cyber threat landscape

Dynamic environment of potential cybersecurity risks, vulnerabilities, and actors.

Signup and view all the flashcards

Hacktivists

Individuals motivated by political/ideological reasons.

Signup and view all the flashcards

Cybercriminals

Individuals who engage in cybercrime for financial gain.

Signup and view all the flashcards

State-Sponsored Actors

Nation-states that conduct cyberattacks for strategic purposes.

Signup and view all the flashcards

Insiders

Employees/contractors who intentionally/unintentionally cause harm.

Signup and view all the flashcards

Malware

Software designed to cause harm.

Signup and view all the flashcards

Ransomware

Malware that encrypts data and demands a ransom for its release.

Signup and view all the flashcards

Phishing

Deceptive attempts to obtain sensitive information.

Signup and view all the flashcards

Social Engineering

Manipulating individuals to reveal confidential information.

Signup and view all the flashcards

Distributed Denial of Service (DDoS)

Overwhelming a target with traffic to make it unavailable.

Signup and view all the flashcards

Insider Threats

Actions by employees that compromise security.

Signup and view all the flashcards

Vulnerabilities

Weaknesses in systems exploitable by attackers.

Signup and view all the flashcards

Attack Vectors

Methods attackers use to exploit vulnerabilities.

Signup and view all the flashcards

Cryptography

Protecting information in all its forms.

Signup and view all the flashcards

Confidentiality

Keeping secret information away from disclosure.

Signup and view all the flashcards

Authentication

Authenticating to allow software to be positively identified.

Signup and view all the flashcards

Nonrepudiation

Providing positive identification of the source of an event.

Signup and view all the flashcards

Key

The specific secret code used in a cryptographic function.

Signup and view all the flashcards

Study Notes

Overview

  • This course covers computing security branches, cybersecurity concepts, challenges, and tools for problem-solving.
  • Topics include network security, threat landscape, authentication, malware, cryptography, risk and incident management, cybercrime, and cybercriminal behavior.

Branches of Computing Security

  • Network security involves security controls, policies, and practices to prevent unauthorized access and misuse.
  • Security architects design system security, maintain documentation, and recommend security controls.
  • Endpoint security protects devices like workstations and servers from cyberattacks.
  • Security engineers design, develop, and maintain secure systems and networks, ensuring protection from attacks.
  • Penetration testing simulates authorized cyberattacks to evaluate system security and is distinct from vulnerability assessments.
  • Security Operations Centers (SOC) monitor, detect, analyze, and respond to cyber threats to protect organizational assets.

Cyber Security Concepts

  • The CIA triad: confidentiality, integrity, and availability as key cybersecurity tenets.
  • Confidentiality: Protecting data from unauthorized viewing or use to maintain security and customer trust.
  • Integrity: Maintaining accurate and complete information by preventing unauthorized alterations.
  • Availability: Ensuring data accessibility to authorized viewers for necessary actions.
  • Cyberattacks: Understanding and defending against various attacks is crucial for cybersecurity professionals.
  • Malware: disrupt systems, bypass authorization, leak data, requiring anti-malware programs and user education.
  • Phishing: aims to steal login data using spam or false info, countered by two-factor authentication.
  • Social Media: poses security threats via malicious friend requests or downloads.
  • Advanced Persistent Threats (APT): relies on phishing or social engineering makes them hard to defend against.
  • Software Patches: patching software vulnerabilities reduces chances of cyberattacks.
  • Identity Access Management (IAM): is a framework to manage online user identities and access levels for system functions.
  • Incident Response (IR): involves protocols for addressing intrusions for personnel and system reaction.
  • Security Information and Event Management (SIEM): centralizes security log data for systematic analysis.
  • Managed Security Service Provider (MSSP): monitors and maintains security for a monthly fee like endpoint detection software and firewalls.
  • Security Operations Center (SOC): manages security with cybersecurity staff.
  • Cloud Access Security Brokers (CASB): Policy plans like encryption and authentication ensure cloud service user's trust.
  • User and Entity Behavior Analytics (UEBA): identifies unusual user behavior to reduce log session noise.
  • Indicators of Compromise (IOC): unfamiliar activity exposes network intrusions during log analysis.
  • Distributed Denial of Service (DDoS): disrupting services by overwhelming a site or using multiple IP addresses.

Cyber Security Tools

  • Wireshark is a free, open-source packet analyzer for network troubleshooting and protocol development.
  • Metasploit identifies system weaknesses.

Basics of Network Security

  • Securing a network involves firewalls and intrusion detection/prevention systems (IDS/IPS).
  • A layered defense strategy creates multiple defensive roadblocks to thwart potential hackers.

Threat Landscape, Authentication, Malware

  • The cyber threat landscape includes risks, vulnerabilities, and actors in the digital world.
  • Cyber threat Landscape threat actors
  • Hacktivists are motivated by political or ideological reasons.
  • Cybercriminals : seek financial gain.
  • State-Sponsored Actors: conduct cyberattacks to gather intelligence.
  • Insiders: cause intentional or unintentional harm.
  • Threats: attacks/vulnerabilities include malware, ransomware, phishing, social engineering, and DDoS attacks.
  • Vulnerabilities: are system weaknesses exploited by attackers.
  • Attack Vectors are methods that attackers use to exploit vulnerabilities.
  • The cyber threat landscape is constantly evolving with new techniques and actors.
  • Threat Landscape Proactive Security
  • Understanding vulnerabilities is vital for organizations to protect themselves.
  • Allocating resources involves allocating resources to address risks.
  • Knowledge of threat landscape gives the ability to respond to cyber incidents.
  • Keeping up to date is vital for maintaining a cyber security
  • Cryptography

Cryptography

  • The art of securing information, ensuring confidentiality, integrity, nonrepudiation, and authentication.
  • Focus include confidentiality, integrity, authentication, nonrepudiation and key distribution.
  • Confidentiality: Encryption keeps data secret and away from prying eyes.
  • Integrity is where can see changes
  • Authentication in electronic messaging validates message origin from a known, trusted entity.
  • Nonrepudiation: Provide source identification
  • Key Distribution
  • Symmetric Cryptography: encryption of one key both encrypt and decrypt.
  • Symmetric Encryption: Preserving confidentiality increased speed over non-symmetric systems and maintaining simplicity
  • Data Encryption Standard (DES) algorithm is still in use today.
  • Triple DES (3DES): DES algorithm extend three times more powerful.
  • Blowfish: fast, is made to be simple
  • RC2 : allows algorithm keys between 1 and 2,048 bits
  • RC4 is notable for its inclusion in the Wired Equivalent Protection (WEP) protocol used in early
  • Wireless network
  • RC 5 users can allow key lenght
  • RC6 : Key lenght is 128_256 bits
  • Rijndael / AES is very fast, is compact and can use Keys that are 128_192_256 bits long
  • Two fish key lenghts of 128_256 bits.

Asymmetric (Public Key) Cryptography:

  • Relatively new, from 1970's, offering key distribution benefits from a key pair: public and private
  • Public key encrypts, only the private key decrypts, ensuring security.
  • PKI System
  • Uses public information
  • Secure in trusted manner
  • Hash algorithm created in digital representation form
  • CA creates certificates and has control with public keys that the CA is resposible for
  • CA need information that gives proves identity. Like name / Licence

Risk Management

  • Is the bad that can impact that achieve objectives
  • The risk for types are strategic / compliance/ financial / operational
  • The framework is a template to identify risk.
  • Risk identification
  • Risk assesment
  • Risk mitigation
  • Risk reporting + monitoring is important to report level risk remain optimal levell.
  • Risk governance ensures employee act with governance
  • Remote Workers
  • Poses cyber-security risks.
  • Wolf-in-sheep clothing attacks increase in sophistication
  • IoT Vulnerability
  • Provide security threats to users / exposing them to cyber attacks
  • Machine Learning
  • Improves paterns 89
  • Increased focus mobile cybersecurity
  • Device becomes appealing avenue of opportunity for cybercriminals
  • Multi factor authentication
  • MFA adds another layer of security - 2 login
  • Artificial intelligence
  • Cyberespionage
  • Is form of gathering intelligence to a target

Malware Prevention:

  • Sophisticated, malicious software desighned by professionals.

Distributed Denial-of-service

  • Can desrupt reular traffic

Ransomware Protection

  • Restricts acess to computer / encrypts attacks and demands a

Ransom

  • Cloud Storages Security important to protect data from cyber attack
  • Fire wall a service fwaas protects
  • XDR Detect
  • Sasse
  • SCRM

Investigation Methods and Techniques

  • Complex / intimidating / hard for understanding
  • Types used are computer science and law to find evidence
  • Cyber crime occurs by identity /analyzing and migrating computer by crime attacks
  • Investigation
  • Gather evidence in order to bring criminals to justice
  • Broad category / wide range
  • Phishing / scams is a big problem to try scam people
  • Types of cyber criminals hackers / individuals access computers networks to steal
  • Insider
  • Types are social media / digital crimes with tools like IDA Pro

Economies of Cybercrime

  • Third-largest economy WEF.
  • Cybercrime 8 trillion / revenue revenue stolen money and productivity damages

Incident management

  • Aims to keep from affecting operations
  • Needs a response team with people that solve it and document

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Network Security Lecture 10
14 questions

Network Security Lecture 10

TantalizingPlutonium avatar
TantalizingPlutonium
Network Security Fundamentals
53 questions
Computer Science Chapter 6 Data Security
38 questions
Use Quizgecko on...
Browser
Browser