Podcast
Questions and Answers
What is one of the primary objectives of cybersecurity?
What is one of the primary objectives of cybersecurity?
- To redesign software for aesthetics
- To protect information systems and networks (correct)
- To eliminate all forms of hacking
- To create new technology for entertainment purposes
Which of the following is NOT considered a critical infrastructure sector?
Which of the following is NOT considered a critical infrastructure sector?
- Energy supply
- Healthcare services
- Agricultural marketing (correct)
- Transportation systems
What is the potential impact of cybercrime on a global scale?
What is the potential impact of cybercrime on a global scale?
- A decrease in software usage
- Increasing operational costs (correct)
- Upper hand in international relations
- Minimal economic effects
Which type of threat involves impersonating another user to gain unauthorized access?
Which type of threat involves impersonating another user to gain unauthorized access?
Which of the following describes a vulnerability in cybersecurity?
Which of the following describes a vulnerability in cybersecurity?
What is the purpose of threat intelligence in cybersecurity?
What is the purpose of threat intelligence in cybersecurity?
Which method is often used for evaluating software security?
Which method is often used for evaluating software security?
Which one of the following is an emerging trend in cybersecurity?
Which one of the following is an emerging trend in cybersecurity?
What should organizations consider as key areas to invest in for cybersecurity?
What should organizations consider as key areas to invest in for cybersecurity?
Which of the following best explains the cost of cybersecurity?
Which of the following best explains the cost of cybersecurity?
What does tampering primarily aim to compromise?
What does tampering primarily aim to compromise?
What type of attack is characterized by attempting to deny access to valid users?
What type of attack is characterized by attempting to deny access to valid users?
Which of the following is a primary objective of social engineering attacks?
Which of the following is a primary objective of social engineering attacks?
What is a common goal of information disclosure attacks?
What is a common goal of information disclosure attacks?
Which type of attack is specifically designed to exploit vulnerabilities in application software?
Which type of attack is specifically designed to exploit vulnerabilities in application software?
Which threat action involves performing operations without a traceable record?
Which threat action involves performing operations without a traceable record?
What is the primary focus of denial of service (DoS) attacks?
What is the primary focus of denial of service (DoS) attacks?
What does elevation of privilege intend to achieve?
What does elevation of privilege intend to achieve?
Which is NOT a form of malware as mentioned in the types of attacks?
Which is NOT a form of malware as mentioned in the types of attacks?
What type of action involves reading data during its transit between two computers?
What type of action involves reading data during its transit between two computers?
Flashcards
Cybersecurity
Cybersecurity
Protecting computer systems and networks from theft, damage, or unauthorized access.
Cybersecurity Objectives
Cybersecurity Objectives
Goals for protecting systems and data, such as confidentiality, integrity, and availability.
Critical Infrastructure
Critical Infrastructure
Essential services like power grids, water systems, and transportation networks.
Cost of Cybersecurity breaches
Cost of Cybersecurity breaches
Signup and view all the flashcards
Vulnerabilities
Vulnerabilities
Signup and view all the flashcards
Threat Modeling (STRIDE)
Threat Modeling (STRIDE)
Signup and view all the flashcards
Spoofing
Spoofing
Signup and view all the flashcards
Threat Intelligence
Threat Intelligence
Signup and view all the flashcards
Software Security
Software Security
Signup and view all the flashcards
National Vulnerability Database
National Vulnerability Database
Signup and view all the flashcards
Tampering
Tampering
Signup and view all the flashcards
Repudiation
Repudiation
Signup and view all the flashcards
Information Disclosure
Information Disclosure
Signup and view all the flashcards
Denial of Service
Denial of Service
Signup and view all the flashcards
Elevation of Privilege
Elevation of Privilege
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Cross-site Scripting (XSS)
Cross-site Scripting (XSS)
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Study Notes
Course Information
- Course name: Cybersecurity Fundamentals
- Course code: CSC 1029
Objectives
- Understand what cybersecurity is and its importance
- Understand what is being protected from attackers
- Understand lessons learned from historical and current events, and emerging trends
Agenda: Week 02
- What is Cybersecurity and Types of Attacks
- Cybersecurity Objectives
- What are we protecting?
- Cost of Cybersecurity
- Your Next Move: Software Developer Vulnerabilities
- Threat Model: STRIDE
- Types of Attacks
- Importance of Software Security
- TODO and Resources for Help
What is Cybersecurity?
- Read CompTIA article: https://www.comptia.org/content/articles/what-is-cybersecurity
- Watch YouTube video: https://www.youtube.com/embed/inWWhr5tnEA
Objectives of Cybersecurity
- Read CompTIA resource: State of Cybersecurity for 2024 Market Overview through to Policy https://www.comptia.org/content/research/cybersecurity-trends-research
- Consider top objectives for Cybersecurity
What are we Protecting?
- Review 16 Critical Infrastructure Sectors https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors
Cost of Cybersecurity
- Estimated global cost of cybercrime in 2021: $6.1 trillion (Source: Cybersecurity Ventures)
- Estimated global spending on cybersecurity in 2022: $172.5 billion (Source: Gartner)
- U.S. job openings requesting cybersecurity-related skills: 714,548 (Source: CyberSeek)
Vulnerabilities
- Review the National Vulnerability Database https://nvd.nist.gov/
- Review visualizations https://nvd.nist.gov/general/visualizations/vulnerabilities/cwe-over-time
Threat Model: STRIDE
- Spoofing
- Tampering
- Repudiation
- Information disclosure
- Denial of service
- Elevation of privilege
- Associated Security Controls
Threat Intelligence
- Read CompTIA blog post: Threat Modeling and Cyber Threat Intelligence: Anticipating the Next Hit https://www.comptia.org/blog/threat-modeling-and-cyber-threat-intelligence
Types of Attacks
- Social engineering attacks (e.g., organization penetration, IT infrastructure exploration, phishing, spam, spoofing, man in the middle)
- Attacks against application software (e.g., Cross-site scripting (XSS), Buffer overflows, SQL code injection, Time/logic bombs, Back door)
- Attacks against supporting infrastructure (e.g., Denial of Service (DoS), Virus, Worm, Trojans, Spyware, Adware)
- Physical attacks (e.g., External drives & Flash Sticks, Bringing down the system, Stealing hardware)
Cybersecurity Principles
- Complete the interactive lesson
Recent Cyber Attacks
- MGM Casino Cyber Attack September 2023 https://westoahu.hawaii.edu/cyber/global-weekly-exec-summary/alphv-hackers-reveal-details-of-mgm-cyber-attack/
Pre-work Grade
- Post weekly discussion question and research solution to D2L
- Complete Week 02 Content Module in D2L to 100%
###Â Help and Support
- Student Office Hours (by Appointment/Drop-in)
- Email: [email protected]
- RRCC On Campus Tutoring: https://www.rrcc.edu/learning-commons/tutoring
- 24/7 Online Tutoring: D2L > Content > Resources for Help
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Dive into the essentials of cybersecurity in this Week 02 quiz. Explore the significance of cybersecurity, the types of attacks, and what we aim to protect. Understand software developer vulnerabilities and the importance of security measures in safeguarding information.