Cybersecurity Career Paths

VeritableViolin avatar
VeritableViolin
·
·
Download

Start Quiz

Study Flashcards

40 Questions

What does cybersecurity focus on protecting?

networked systems and data

Cybersecurity professionals must operate within legal boundaries and use their skills ethically.

True

Cybersecurity is the ongoing effort to protect __________ systems and data from unauthorized use or harm.

networked

Which of the following can be part of a career in cybersecurity? (Select all that apply)

Ethical Hacker

Match the following types of data with their examples:

Personal Data = Pictures shared with family and friends Medical Records = Prescriptions and counseling history Education Records = Grades, test scores, and awards Employment and Financial Records = Income, expenditures, and credit rating

What does the term 'Intellectual Property' refer to in the context of corporate data?

Trademarks

Define the CIA Triad in the context of information security.

Confidentiality, Integrity, Availability

Encrypting data is a method to ensure confidentiality.

True

A hash function uses a mathematical algorithm to transform data into a fixed-length value known as ______.

hash

Match the following security breach examples with their respective companies:

LastPass Security Breach = LastPass Vtech Security Breach = Vtech Equifax Security Breach = Equifax Inc.

What type of malware is designed to track and spy on the user?

Spyware

What are some common types of malware? (Select all that apply)

Spyware

Spyware often modifies security settings.

True

____ is malware designed to automatically deliver advertisements.

Adware

What type of attackers are interested in exploiting vulnerability for personal or financial gain?

Hackers

Gray hat attackers are committed to illegal activities for personal gain.

False

What do white hat hackers do to discover weaknesses in systems?

Perform network penetration tests

______ are usually groups of professional criminals focused on control, power, and wealth.

Cyber criminals

Match the type of attacker with their description:

Black Hat Hacker = Violate computer and network security for personal gain or malicious reasons Grey Hat Hacker = Commits crimes and discloses vulnerabilities publicly without personal gain White Hat Hacker = Use programming skills for ethical and legal purposes

What type of malware is designed to hold a computer system or its data captive until a ransom is paid?

Ransomware

Ransomware usually spreads through email attachments.

False

What is the purpose of a Trojan horse malware?

To carry out malicious operations under the guise of a desired operation.

______ are responsible for some of the most devastating attacks on the Internet.

Worms

Match the following malware symptom with its description:

There is an increase in CPU usage. = Common malware symptom Files are deleted. = Common malware symptom The computer freezes or crashes often. = Common malware symptom Unknown processes running. = Malware symptom Email is being sent without the user's knowledge or consent. = Malware symptom

Which technique involves manipulating a person to provide the Wi-Fi password?

Social engineering

What are infected hosts called in the context of cyberattacks?

zombies

What is the goal of SEO poisoning?

Increase traffic to malicious sites

Blended attacks use only a single technique to compromise a target.

False

A hybrid of worms, Trojan horses, spyware, keyloggers, spam, and phishing schemes are seen in __________ attacks.

blended

What is the main objective of Impact Reduction in cybersecurity?

contain the damage

What is recommended to protect computing devices from intrusion?

Updating the operating system and web browsers

Wireless networks should always use default SSID and passwords for security purposes.

False

What type of encryption should you enable for wireless communication to enhance security?

WPA2

Using the same password for all online accounts is safe.

False

What does VPN stand for and how does it help protect data on a wireless network?

VPN stands for Virtual Private Network. It helps protect data on a wireless network by providing a secure and encrypted connection between the user's device and the VPN server, ensuring data confidentiality and integrity.

To prevent unauthorized physical access to computing devices, it is recommended to use __________ instead of passwords.

passphrases

Match the following tips for creating strong passwords/passphrases:

Do not use dictionary words or names in any language = Choose a meaningful statement to you Use special characters, such as !@ # $ % ^ & * ( ) = Add special characters The longer the better = The longer the better Avoid common or famous statements = Avoid common or famous statements

What is encryption and how does it protect data?

Encryption is the process of converting information into a form that unauthorized parties cannot read. It protects data by making it accessible only to trusted individuals with the secret key or password needed to decrypt the data.

Which feature can be used in Windows to encrypt data?

EFS

Having a backup of data is unnecessary.

False

Study Notes

Introduction to Cybersecurity

  • This course is an introduction to the field of cybersecurity, covering the basics of online safety, types of malware and attacks, and career options in cybersecurity.
  • Cybersecurity professionals have various roles, including Cybersecurity Guru, Cybersecurity Forensic Expert, Information Security Expert, and Ethical Hacker.

Chapter 1: The Need for Cybersecurity

  • Cybersecurity is necessary to protect personal data, including medical records, education records, employment and financial records, and online identity.
  • Personal data is stored in various devices, including computing devices, and can be accessed by cybercriminals.
  • Cybercriminals want money and personal identity.
  • Organizational data includes traditional data, Internet of Things (IoT) and Big Data, and must be protected to ensure confidentiality, integrity, and availability.
  • Confidentiality ensures that data is only accessible to authorized individuals, integrity ensures that data is accurate and complete, and availability ensures that data is accessible when needed.
  • Cybersecurity professionals must have the same skills as cyber attackers, but work within the bounds of the law and use their skills ethically.
  • Cyber warfare is the use of technology to attack a country's infrastructure and disrupt its operations.

Types of Attackers and Cybersecurity Professionals

  • Types of attackers include internal and external threats, with internal threats coming from within an organization and external threats coming from outside.
  • Cybersecurity professionals must have the same skills as cyber attackers, but work within the bounds of the law and use their skills ethically.

Cybersecurity Breaches

  • Cybersecurity breaches can have severe consequences, including financial loss, damage to reputation, and legal liability.
  • Examples of cybersecurity breaches include Security Breach Example 1, Security Breach Example 2, and Security Breach Example 3.### The Need for Cybersecurity
  • Digital information gathering and sharing increases the need to protect national security and economic stability
  • Cybersecurity is the ongoing effort to protect networked systems and data from unauthorized use or harm

Your Online and Offline Identity

  • Online identity is how you present yourself online, and should only reveal limited information
  • Offline identity is your personal life, including friends, family, and daily interactions
  • Choose a username or alias that does not include personal information and is respectful

Your Data

  • Any information about you is considered your data, including personal, medical, financial, and educational information
  • Data includes pictures, messages, and other online exchanges with family and friends
  • Data can be used to identify you and can be accessed, shared, and sold by companies and hackers

Medical Records

  • Electronic Health Records (EHRs) include medical history, mental health, and personal information
  • Medical devices, such as fitness bands, generate clinical data that can become part of your medical records

Education and Employment Records

  • Education records include grades, test scores, attendance, and disciplinary reports
  • Employment records include income, expenditures, tax records, and performance information

Where is Your Data?

  • Data is stored on your devices, in company databases, and on servers around the world
  • Data can be accessed and shared by companies, hackers, and governments

Cybersecurity Threats

  • Hackers want your money, identity, and personal information
  • Cybercriminals use stolen credentials to access accounts and steal money
  • Identity theft can lead to financial loss, reputation damage, and long-term consequences

Organizational Data

  • Corporate data includes personnel information, intellectual property, and financial data
  • Intellectual property, such as patents and trade secrets, is valuable and vulnerable to theft
  • Financial data, including income statements and balance sheets, is sensitive and confidential

Confidentiality, Integrity, and Availability (CIA Triad)

  • Confidentiality ensures data privacy through authentication and encryption
  • Integrity ensures data accuracy and trustworthiness through version control and checksum hashing
  • Availability ensures data accessibility to authorized personnel through backups and recovery plans

The Consequences of a Security Breach

  • A breach can result in lost data, downtime, and revenue loss

  • A breach can lead to reputational damage, legal liability, and employee turnover

  • The monetary cost of a breach is higher than just replacing lost devices and investing in security### Cybersecurity and Attacks

  • Cybercriminals can take over online accounts if people reuse their passwords on different websites and accounts, leading to security breaches and impact on company reputation.

  • Parents need to be more vigilant about their children's privacy online and demand better security for children's products.

  • Manufacturers of network-connected products need to be more aggressive in protecting customer data and privacy.

Equifax Security Breach

  • Equifax, a consumer credit reporting agency, experienced a data breach in 2017, exposing millions of U.S. consumers' sensitive personal data.
  • The breach, which occurred between May and July 2017, included full names, Social Security numbers, birth dates, addresses, and other personally identifiable information.
  • The breach may have affected customers in the United Kingdom and Canada.

Attackers and Cybersecurity Professionals

  • Attackers are individuals or groups who attempt to exploit vulnerabilities for personal or financial gain.
  • Types of attackers include:
    • Amateurs (Script Kiddies): attackers with little or no skill, using existing tools or instructions found on the Internet.
    • Hackers:
      • White Hat: ethical hackers who use their skills for good, ethical, and legal purposes.
      • Grey Hat: individuals who commit crimes, but not for personal gain or to cause damage.
      • Black Hat: unethical criminals who violate computer and network security for personal gain or malicious reasons.
    • Organized Hackers: groups of cyber criminals, hacktivists, terrorists, and state-sponsored hackers.

Internal and External Threats

  • Internal security threats: attacks originated from within an organization, often by employees or contractors who can mishandle confidential data, threaten internal servers, or facilitate outside attacks.
  • External security threats: attacks from amateurs or skilled attackers who exploit vulnerabilities in network or computing devices, or use social engineering to gain access.

Cyberwarfare

  • Cyberwarfare is an Internet-based conflict that involves the penetration of computer systems and networks of other nations.
  • The main purpose of cyberwarfare is to gain advantage over adversaries, whether nations or competitors.
  • Cyberwarfare can be used for industrial and militaristic espionage, sabotage, and stealing defense secrets.
  • Examples of cyberwarfare include the Stuxnet malware, which was designed to damage Iran's nuclear enrichment plant.

Analyzing a Cyberattack

  • Security vulnerabilities are software or hardware defects that can be exploited by malicious users.
  • Exploits are programs written to take advantage of known vulnerabilities.
  • The goal of a cyberattack is to gain access to a system, its data, or a specific resource.
  • Software vulnerabilities are often introduced by errors in the operating system or application code.
  • Examples of software vulnerabilities include the SYNful Knock vulnerability in Cisco IOS, which allowed attackers to gain control of enterprise-grade routers.

Explore the various career paths in the field of cybersecurity, including Cybersecurity Guru, Cybersecurity Forensic Expert, and Ethical Hacker. Learn about the exciting and high-demand field of cybersecurity.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Computer Security Basics
10 questions
Computer Security Fundamentals
5 questions
Cybersecurity Threats and Assets
30 questions
Use Quizgecko on...
Browser
Browser