Podcast
Questions and Answers
Which of the following best describes cyber crime?
Which of the following best describes cyber crime?
- Crimes related to the sale of physical goods online.
- Crimes that involve physical harm to individuals.
- Crimes committed using computers, phones, or the internet. (correct)
- Crimes that occur in a virtual reality environment.
Cyber security primarily focuses on protecting physical infrastructure from damage.
Cyber security primarily focuses on protecting physical infrastructure from damage.
False (B)
Name three of the five key principles of cyber security.
Name three of the five key principles of cyber security.
Confidentiality, Integrity, Availability
The cyber security principle of __________ ensures that information is trustworthy and accurate.
The cyber security principle of __________ ensures that information is trustworthy and accurate.
Match the following cyber security principles with their definitions:
Match the following cyber security principles with their definitions:
What is the primary goal of a cyber threat?
What is the primary goal of a cyber threat?
A cyber threat only originates from external sources outside of an organization.
A cyber threat only originates from external sources outside of an organization.
List three potential sources of cyber threats.
List three potential sources of cyber threats.
Cyber threats can be classified based on attacker's resources, organization, and ___________.
Cyber threats can be classified based on attacker's resources, organization, and ___________.
Match the cyber threat classification with its description:
Match the cyber threat classification with its description:
What is a key characteristic of unstructured cyber threats?
What is a key characteristic of unstructured cyber threats?
Structured cyber threats are characterized by the limited funds available to the attackers.
Structured cyber threats are characterized by the limited funds available to the attackers.
What are the typical characteristics of Highly Structured Cyber Threats?
What are the typical characteristics of Highly Structured Cyber Threats?
The Cyber Threat Unit evaluates cyber threats daily and assigns a threat __________ level.
The Cyber Threat Unit evaluates cyber threats daily and assigns a threat __________ level.
Match the threat index level with its description:
Match the threat index level with its description:
Which of the following is an example of a cyber attack where an unauthorized person stays undetected on a network for a long period?
Which of the following is an example of a cyber attack where an unauthorized person stays undetected on a network for a long period?
A backdoor is a type of cyber attack that improves network authentication processes.
A backdoor is a type of cyber attack that improves network authentication processes.
Describe the main purpose of a 'Man-in-the-middle' attack.
Describe the main purpose of a 'Man-in-the-middle' attack.
A ___________ attack occurs when attackers attempt to prevent authorized users from accessing a service.
A ___________ attack occurs when attackers attempt to prevent authorized users from accessing a service.
Match the type of cyber attack with its description:
Match the type of cyber attack with its description:
Which of the following is not a potential result of a successful cyber attack?
Which of the following is not a potential result of a successful cyber attack?
Malicious code is designed to enhance the performance and security of a computer system.
Malicious code is designed to enhance the performance and security of a computer system.
How can we describe a computer virus?
How can we describe a computer virus?
A ____________ is a standalone malware that replicates itself to spread to other computers.
A ____________ is a standalone malware that replicates itself to spread to other computers.
Match the type of malicious code with its description:
Match the type of malicious code with its description:
What is NOT a capability of a Botnet?
What is NOT a capability of a Botnet?
A keylogger is a software that enhances the graphics display on a computer.
A keylogger is a software that enhances the graphics display on a computer.
Give two examples of Malicious Code.
Give two examples of Malicious Code.
___________ is designed to display advertisements and redirect search requests to collect marketing data.
___________ is designed to display advertisements and redirect search requests to collect marketing data.
What is required to define 'Vulnerability'?
What is required to define 'Vulnerability'?
A vulnerability is classified only according to hardware assets.
A vulnerability is classified only according to hardware assets.
Name three potential causes of vulnerabilities in a system.
Name three potential causes of vulnerabilities in a system.
One cause of security vulnerabilities is the use of ___________ credentials instead of stronger encrypted ones.
One cause of security vulnerabilities is the use of ___________ credentials instead of stronger encrypted ones.
Match the following terms with their descriptions.
Match the following terms with their descriptions.
What is the main function of a Cipher?
What is the main function of a Cipher?
The process of decryption involves converting ciphertext back into plaintext without a key.
The process of decryption involves converting ciphertext back into plaintext without a key.
What does encypt/encipher mean?
What does encypt/encipher mean?
____________ allows the substitution of meaningful text for innocuous phrases.
____________ allows the substitution of meaningful text for innocuous phrases.
What is the Caesar Cipher?
What is the Caesar Cipher?
The Enigma Machine is considered a basic method of encryption.
The Enigma Machine is considered a basic method of encryption.
Name three real-world applications of cryptography.
Name three real-world applications of cryptography.
____________ ensures the integrity of data and can be just as important as keeping them confidential.
____________ ensures the integrity of data and can be just as important as keeping them confidential.
Flashcards
What is Cyber Crime?
What is Cyber Crime?
Crimes committed using computers, phones or the internet.
What is Cyber Security?
What is Cyber Security?
Technologies, processes, and practices protecting individuals/organizations from cyber crime.
What is Confidentiality?
What is Confidentiality?
Limiting access or restrictions on certain types of information.
What is Integrity?
What is Integrity?
Signup and view all the flashcards
What is Availability?
What is Availability?
Signup and view all the flashcards
What is Accountability?
What is Accountability?
Signup and view all the flashcards
What is Auditability?
What is Auditability?
Signup and view all the flashcards
What is a Cyber Threat?
What is a Cyber Threat?
Signup and view all the flashcards
What is an Algorithm?
What is an Algorithm?
Signup and view all the flashcards
What is a Cipher?
What is a Cipher?
Signup and view all the flashcards
What is Ciphertext?
What is Ciphertext?
Signup and view all the flashcards
What is a Key?
What is a Key?
Signup and view all the flashcards
What is Plaintext
What is Plaintext
Signup and view all the flashcards
What is Encryption?
What is Encryption?
Signup and view all the flashcards
What is Hashing?
What is Hashing?
Signup and view all the flashcards
What is a Digital Signature?
What is a Digital Signature?
Signup and view all the flashcards
What is a Certificate?
What is a Certificate?
Signup and view all the flashcards
What is Symmetric Encryption?
What is Symmetric Encryption?
Signup and view all the flashcards
What is Asymmetric Encryption?
What is Asymmetric Encryption?
Signup and view all the flashcards
What Defines Confidentiality?
What Defines Confidentiality?
Signup and view all the flashcards
What Defines Intergrity?
What Defines Intergrity?
Signup and view all the flashcards
What Defines Avaibility?
What Defines Avaibility?
Signup and view all the flashcards
What Defines Accountability?
What Defines Accountability?
Signup and view all the flashcards
What Defines Auditability?
What Defines Auditability?
Signup and view all the flashcards
What Is A Cyber Threat?
What Is A Cyber Threat?
Signup and view all the flashcards
What are Unstructured Cyber Threats?
What are Unstructured Cyber Threats?
Signup and view all the flashcards
What are Structured Cyber Threats?
What are Structured Cyber Threats?
Signup and view all the flashcards
What are Highly Structured Threats?
What are Highly Structured Threats?
Signup and view all the flashcards
What is Advanced Persistent Threat (APT)?
What is Advanced Persistent Threat (APT)?
Signup and view all the flashcards
What is a Backdoor Vulnerability?
What is a Backdoor Vulnerability?
Signup and view all the flashcards
What is Buffer Overflow?
What is Buffer Overflow?
Signup and view all the flashcards
What is a Man-In-The-Middle Attack?
What is a Man-In-The-Middle Attack?
Signup and view all the flashcards
What is Denial-Of-Service Attack (DOS)?
What is Denial-Of-Service Attack (DOS)?
Signup and view all the flashcards
What is SQL Injection??
What is SQL Injection??
Signup and view all the flashcards
What is Spyware?
What is Spyware?
Signup and view all the flashcards
What is Ransomware?
What is Ransomware?
Signup and view all the flashcards
Study Notes
Cyber Crime
- Crimes are committed using computers, phones, or the internet
- Types include illegal interception of data, system interferences, copyrights infringements, and sale of illegal items
Cyber Security
- Technologies, processes, and practices protect individuals and organizations from cybercrimes
- Designed to safeguard the integrity of networks, computers, programs, and data from attack, damage, or unauthorized access
Cyber Security Principles
- There are five key principles in cyber security:
- Confidentiality: A set of rules that limits access or places restrictions on certain types of information
- Integrity: Assurance that information is trustworthy and accurate
- Availability: A guarantee of reliable access to information by authorized people
- Accountability: An assurance that an individual or organization is evaluated on performance or behavior related to responsibility
- Auditability: Security audit is a systematic evaluation of a company's information system via measuring conformance to established criteria
Cyber Threats
- Any malicious act that attempts to gain unauthorized access to a computer network
- Encompasses a wide range of malicious activities that can damage or disrupt computer systems, networks, or the information they contain
- Common examples include social engineered Trojans, unpatched software, phishing, and network worms
- Cyber Threats: Their Sources
- Cyber threats can originate from various sources, including national governments, terrorists, industrial secret agents, rogue employees, hackers, business competitors, and organization insiders
- Anyone with a motive and the necessary technology can pose a cyber threat
- Cyber Threat Classifications
- Threats classified by attacker's resources, organization, and funding
- 3 types: unstructured, structured, and highly structured
Unstructured Cyber Threats
- Resources: Individual or small group
- Organization: Little to no organization
- Funding: Negligible
- Attack: Easy to detect with freely available cyberattack tools
- Exploitation: Based on documented vulnerabilities
Structured Cyber Threats
- Resources: Well-trained individuals or groups
- Organization: Well-planned
- Funding: Available
- Attack: Targeted against specific individuals or organizations
- Exploitation: Based on information gathering
Highly Structured Cyber Threats
- Organization: Extensive organization with planning over time
- Attack: Long-term attacks on particular machines or data
- Exploitation: Utilizes multiple methods, including technical, social, and insider help
Cyber Security Threat Index Level
- Cyber threats are evaluated daily by the Counter Threat Unit (CTU) and assigned a threat index level
- The threat index levels are:
- Level 1: Guarded
- Level 2: Elevated
- Level 3: High
- Level 4: Critical
Types of Cyber Attacks
- Advanced Persistent Threat (APT): Unauthorized access to a network that remains undetected for a long period
- Backdoor: Bypassing normal authentication methods to gain access in an OS or application
- Buffer Overflow: Exploiting a program waiting for user input
- Man-in-the-Middle Attack: Interception and relay of messages between communicating parties
- Cross-Site Scripting (XSS): Code injection attack to execute malicious JavaScript in another user's browser
- Denial of Service Attack: Preventing authorized users from accessing a service
- SQL injection: Exploiting web application vulnerabilities to steal or alter data in a website's database
- Zero-day Exploit: Exploiting an undisclosed and unpatched vulnerability in a system or device
Impacts of Cyber Attacks
- Cause major damage to organizations or systems as well as to business reputation and consumer trust
- Results can include financial loss, reputational damage, and legal consequences
Types of Malicious Code
- Virus: Replicates itself by modifying other computer programs and inserting its own code
- Network Worm: Standalone malware that replicates to spread to other computers
- Trojan Horse: Claims to free your computer from viruses but introduces them instead
- Botnet: Used for DDoS attacks, data theft, spamming, and gaining attacker access to a device
- Keylogger: Surveillance technology to monitor and record keystrokes on a computer's keyboard
- Rootkit: Collection of tools to enable administrator-level access to a computer or network
- Spyware: Hidden software to gather information about internet interaction, keystrokes, passwords, and valuable data
- Adware: Displays advertisements and redirects search requests to advertising websites to collect marketing data
- Ransomware: Malware that prevents or limits access to a system by locking the screen or files, demanding a ransom
Cyber Security Vulnerabilities
- Cyber-security term for a flaw in a system that can be exploited
- Vulnerability: Is the composition of 3 elements:
- Flaw in system
- Access of attacker to that flaw
- Capability of attacker to exploit the flaw
- Vulnerabilities are Classified According to the Asset:
- Hardware.
- Software.
- Network.
- Personal.
- Physical site.
- Organizational.
Causes of Vulnerabilities
- Missing patches
- Cleartext credentials
- Using unencrypted channels
- RF Emanation
Cryptography
- Kathleen Richards describes Cryptography to be a method of protecting information and communications, only allowing those for whom the information intended to be able to read and process
- The prefix "crypt-" means "hidden" or "vault," and the suffix "-graphy" stands for "writing."
- Algorithm: Instructions to accomplish a task that terminates in a defined end state
- Cipher: Core algorithm used to encrypt data, transforming plaintext into ciphertext that requires a key for reversal
- Ciphertext: Text in encrypted form
- Codes: Equivalence table (codebook) allowing substitution of meaningful text for innocuous messages
- Decrypt/Decipher: Process of retrieving plaintext from ciphertext
- Encrypt/Encipher: Altering plaintext with a secret code to be unintelligible to unauthorized parties
- Key: Word or system for solving a cipher or code
- Plaintext: Original message before encoding or enciphering
- Encryption: Transforms data intended for authorized persons
- Crucial for file encryption, message scrambling, authentication and internet transactions
- Encrypting/Deciphering: Uses a key to scramble the contents of a file
- Key space: Total keys for an encryption algorithm affected by the key's length
- History of cryptology goes back many millennia in ancient Egyptian India etc.
Caesar Cipher
- Basic encryption where letters shift fixed places down the alphabet
Enigma Machine
- Device to encrypt messages used during World War II.
Applying Cryptography to Computer Security
-
Data gets exposed unlike files residing in the office
-
Confidentiality: Encryption which defines encryption
-
Integrity: Data is often as important as protection
-
Authentication: Ability to confirm the identity of the user
-
Not a defense against distraction of data
-
Security: Valuable asset for computer data
-
Symmetric Encryption
- A single key is used for both encryption and decryption
- Common Algorithms: AES, DES, 3DES, Blowfish
- How it Works:
- Sender encrypts plaintext with a key
- Use Cases: Secure file storage, VPNs, database encryption
- Pros: Fast, efficient. Cons: Key distribution problem.
-
Asymmetric Encryption Uses public key for encryption and private key decryption
- Common Algorithms: RSA, ECC, Diffie-Hellman.
- How it Works:
- Public key encrypts the data
- Private key decrypts the data
- Use Digital signatures, secure communications (SSL/TLS), cryptocurrency transactions.
- Pros Secure key exchange, digital authentication
-
Cons Slower than symmetric encryption
Hashing, Digital Signatures, and Certificates
- Mathematical function that converts data into a fixed-length string ("fingerprint") to verify integrity
- Digital signature: Uses a private key to "sign" a document, helping authenticity plus tampering
- Certificate: Issued by a trusted 3rd party verifying the identity of an entity
- Digital SignaturesEncrypting to verify document's authenticity/Integrity
- Digital Signatures
- Secures communication
- Provides non repudiation
- Prevents the sender to deny the document
- Verifies to trusted CA (certificate authority)
- Secures communication via HTTPS
- Hashing - Creates unique string to verify integrity, password storage,
- "One way Function"- process to get original data from a hash that is one way.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Overview of cybercrimes committed using digital devices like computers and phones. Focus on the technologies, processes, and practices designed to protect data and networks from cyberattacks, emphasizing key principles like confidentiality, integrity and availability.