Podcast
Questions and Answers
What has the growth of data created opportunities for?
What has the growth of data created opportunities for?
- Data misuse
- Cyber criminals
- Unauthorized access
- Cybersecurity specialists (correct)
Which entities provide important services and opportunities for their customers?
Which entities provide important services and opportunities for their customers?
- Individuals
- Small businesses
- Cyber criminals
- Organizations like Google and Amazon (correct)
What capability do cyber wizards now have with technology?
What capability do cyber wizards now have with technology?
- Steal sensitive data
- Create computer viruses
- Track worldwide weather trends (correct)
- Cause harm to others
What is a responsibility of businesses that collect and harness data?
What is a responsibility of businesses that collect and harness data?
What risk is posed by growth in data collection and analytics if precautions are not taken?
What risk is posed by growth in data collection and analytics if precautions are not taken?
The technology available allows tracking of what?
The technology available allows tracking of what?
The increase in what has created opportunities for cybersecurity specialists?
The increase in what has created opportunities for cybersecurity specialists?
What have businesses large and small recognized the power of?
What have businesses large and small recognized the power of?
What is a primary function of Geospatial Information Systems (GIS)?
What is a primary function of Geospatial Information Systems (GIS)?
What is the main goal of white hat hackers?
What is the main goal of white hat hackers?
Which type of attacker violates computer security for personal gain?
Which type of attacker violates computer security for personal gain?
What is a common activity for script kiddies?
What is a common activity for script kiddies?
What is the main goal of vulnerability brokers?
What is the main goal of vulnerability brokers?
Which U.S. organization created a framework for companies needing cybersecurity professionals?
Which U.S. organization created a framework for companies needing cybersecurity professionals?
What is a common method used by hacktivists to protest?
What is a common method used by hacktivists to protest?
Which of the following is a category within the Cybersecurity Workforce Framework?
Which of the following is a category within the Cybersecurity Workforce Framework?
Which of the following is a potential benefit of collecting and analyzing large amounts of data?
Which of the following is a potential benefit of collecting and analyzing large amounts of data?
Which category of the Cybersecurity Workforce Framework includes identifying and mitigating threats to internal systems?
Which category of the Cybersecurity Workforce Framework includes identifying and mitigating threats to internal systems?
What distinguishes gray hat attackers from black hat attackers?
What distinguishes gray hat attackers from black hat attackers?
Which category involves the investigation of cyber events and cybercrimes?
Which category involves the investigation of cyber events and cybercrimes?
Which category includes support, administration, and maintenance to ensure IT system performance and security?
Which category includes support, administration, and maintenance to ensure IT system performance and security?
What does the 'Analyze' category of the Cybersecurity Workforce Framework involve?
What does the 'Analyze' category of the Cybersecurity Workforce Framework involve?
Which category provides leadership and management to conduct cybersecurity work effectively?
Which category provides leadership and management to conduct cybersecurity work effectively?
Which of the following is a key activity within the 'Securely Provision' category?
Which of the following is a key activity within the 'Securely Provision' category?
Which of the following is a sector of the kingdom that needs protection?
Which of the following is a sector of the kingdom that needs protection?
Which of the following is a security concern at the corporate level?
Which of the following is a security concern at the corporate level?
Which U.S. agency is responsible for intelligence collection and surveillance activities?
Which U.S. agency is responsible for intelligence collection and surveillance activities?
From where can attacks originate?
From where can attacks originate?
What type of access do internal users have?
What type of access do internal users have?
What might internal attackers have knowledge of?
What might internal attackers have knowledge of?
How do external attackers commonly gain access to internal resources?
How do external attackers commonly gain access to internal resources?
What method do external attackers use to gain access?
What method do external attackers use to gain access?
Which of the following is an example of cybersecurity legislation?
Which of the following is an example of cybersecurity legislation?
What does the term 'cyber wizards' refer to?
What does the term 'cyber wizards' refer to?
What is a cyber vulnerability?
What is a cyber vulnerability?
Which of the following is considered a prime target for cyber criminals?
Which of the following is considered a prime target for cyber criminals?
What is the primary function of packet-sniffing tools used by criminals?
What is the primary function of packet-sniffing tools used by criminals?
What is the purpose of packet forgery (or packet injection)?
What is the purpose of packet forgery (or packet injection)?
Which of the following is a source of data that can come from established organizations and be targeted by cyber threats?
Which of the following is a source of data that can come from established organizations and be targeted by cyber threats?
What is a cybersecurity threat?
What is a cybersecurity threat?
What does the ISACA Certified Information Security Manager (CISM) certification primarily focus on?
What does the ISACA Certified Information Security Manager (CISM) certification primarily focus on?
What do company-sponsored cybersecurity certifications typically measure?
What do company-sponsored cybersecurity certifications typically measure?
What does the Cisco Certified Network Associate Security (CCNA Security) certification validate?
What does the Cisco Certified Network Associate Security (CCNA Security) certification validate?
Why might a cybersecurity professional have unconventional working hours?
Why might a cybersecurity professional have unconventional working hours?
What is a crucial aspect of a cyber hero's work regarding cyber criminals?
What is a crucial aspect of a cyber hero's work regarding cyber criminals?
What is recommended as a way to learn the basics for a career in cybersecurity?
What is recommended as a way to learn the basics for a career in cybersecurity?
What should cybersecurity specialists do to keep up with the ever-changing field?
What should cybersecurity specialists do to keep up with the ever-changing field?
What is a valuable opportunity for students seeking a cybersecurity career?
What is a valuable opportunity for students seeking a cybersecurity career?
Flashcards
Data Analytics
Data Analytics
Collecting and using data to gain valuable insights and improve decision-making.
Data Protection Responsibility
Data Protection Responsibility
The responsibility companies have to keep data safe from misuse and unauthorized access.
Cybersecurity Specialists
Cybersecurity Specialists
Specialists who work to protect data and systems from cyber threats.
Data-Driven Businesses
Data-Driven Businesses
Signup and view all the flashcards
Data Security Risks
Data Security Risks
Signup and view all the flashcards
Big Data
Big Data
Signup and view all the flashcards
Kingdoms
Kingdoms
Signup and view all the flashcards
Cyber Wizards Technology
Cyber Wizards Technology
Signup and view all the flashcards
Geospatial Information Systems (GIS)
Geospatial Information Systems (GIS)
Signup and view all the flashcards
Internet of Everything (IoE)
Internet of Everything (IoE)
Signup and view all the flashcards
Hackers
Hackers
Signup and view all the flashcards
White Hat Hackers
White Hat Hackers
Signup and view all the flashcards
Gray Hat Hackers
Gray Hat Hackers
Signup and view all the flashcards
Black Hat Hackers
Black Hat Hackers
Signup and view all the flashcards
Script Kiddies
Script Kiddies
Signup and view all the flashcards
Vulnerability Brokers
Vulnerability Brokers
Signup and view all the flashcards
Cybersecurity Legislation
Cybersecurity Legislation
Signup and view all the flashcards
Cyber Wizards
Cyber Wizards
Signup and view all the flashcards
Cybersecurity Threat
Cybersecurity Threat
Signup and view all the flashcards
Cyber Vulnerability
Cyber Vulnerability
Signup and view all the flashcards
Sources of Data
Sources of Data
Signup and view all the flashcards
Network Service Targets
Network Service Targets
Signup and view all the flashcards
Packet-Sniffing Tools
Packet-Sniffing Tools
Signup and view all the flashcards
Packet Forgery
Packet Forgery
Signup and view all the flashcards
NIST Cybersecurity Framework
NIST Cybersecurity Framework
Signup and view all the flashcards
Operate and Maintain
Operate and Maintain
Signup and view all the flashcards
Protect and Defend
Protect and Defend
Signup and view all the flashcards
Investigate
Investigate
Signup and view all the flashcards
Collect and Operate
Collect and Operate
Signup and view all the flashcards
Analyze
Analyze
Signup and view all the flashcards
Oversight and Development
Oversight and Development
Signup and view all the flashcards
Securely Provision
Securely Provision
Signup and view all the flashcards
Sectors of the Kingdom
Sectors of the Kingdom
Signup and view all the flashcards
NSA Responsibilities
NSA Responsibilities
Signup and view all the flashcards
Internal Security Threat
Internal Security Threat
Signup and view all the flashcards
Internal Threat Damage
Internal Threat Damage
Signup and view all the flashcards
External Security Threats
External Security Threats
Signup and view all the flashcards
External Attack Method
External Attack Method
Signup and view all the flashcards
Corporate Level Security
Corporate Level Security
Signup and view all the flashcards
Origin of Attacks
Origin of Attacks
Signup and view all the flashcards
CISM
CISM
Signup and view all the flashcards
Company-Sponsored Certifications
Company-Sponsored Certifications
Signup and view all the flashcards
CCNA Security
CCNA Security
Signup and view all the flashcards
Cyber Hero Role
Cyber Hero Role
Signup and view all the flashcards
Importance of Studying
Importance of Studying
Signup and view all the flashcards
Value of Certifications
Value of Certifications
Signup and view all the flashcards
Benefits of Internships
Benefits of Internships
Signup and view all the flashcards
Professional Organizations
Professional Organizations
Signup and view all the flashcards
Study Notes
Characteristics of the Cybersecurity World
- Great businesses collect and harness data and data analytics for power.
- The businesses are responsible for protecting data from misuse and unauthorized access.
- Data growth has created opportunities for cybersecurity specialists.
- Businesses of all sizes recognize the power of big data and data analytics.
- Organizations like Google, LinkedIn, and Amazon provide important services and opportunities for customers.
- The growth in data collection and analytics poses risks to individuals and modern life if data protection precautions aren't taken.
- Cyber experts use technology to track weather, monitor oceans, and track people, animal, and object behavior in real time.
- New technologies like Geospatial Information Systems (GIS) and the Internet of Everything (IoE) depend on collecting and analyzing data.
- Data collections can save energy, improve efficiencies, and reduce safety risks.
Criminals and Cybersecurity Professionals
- Hackers, as cybersecurity criminals, break into computers or networks for various reasons.
- White hat hackers break into systems to discover weaknesses and improve system security.
- Gray hat hackers may report vulnerabilities if it aligns with their agenda.
- Black hat hackers are unethical criminals who violate computer, network security for personal gain, and for malicious reasons.
- Script kiddies, often teenagers or hobbyists with limited skills, use existing tools for pranks and vandalism.
- Vulnerability brokers are gray hat hackers who discover exploits and report them to vendors, sometimes for rewards.
- Hacktivists are gray hat hackers who protest against political and social ideas.
- Hacktivists protest against organizations or governments by posting articles, videos, leaking information, and performing DDoS attacks.
- Cyber Criminals are black hat hackers that work alone or for cybercrime organizations, stealing billions from consumers and businesses yearly.
- State-sponsored hackers, either white or black hat, steal secrets, gather intelligence, and sabotage networks.
- Targets of state-sponsored hackers are foreign governments, terrorist groups, and corporations and most countries are engage in this.
- Actions by organizations to limit or fend off cyber criminals include coordinated actions.
- The Nation Common Vulnerabilities and Exposures, CVE Databases, is an example of this action.
- The CVE National Database offers a public database of vulnerabilities.
- The Honeynet project is an example of creating Early Warning Systems.
- The HoneyMap displays real-time visualization of attacks.
- InfraGard is an example of sharing cyber intelligence and is a partnership dedicating sharing information and intelligence to prevent attacks.
- The ISO 27000 standards are an example of Information Security Management Standards that provide a framework for cybersecurity measures.
- ISCA tracks new laws related to cybersecurity that address privacy and protection of intellectual property. Examples of these include Cybersecurity Act, Notification Act and the Data Accountability and Trust Act.
Comparing Cybersecurity Threats
- Cyber experts are visionaries who build the cyber kingdom and recognize the influence of data to build great organizations.
- Cyber experts recognize the threat that data poses if used against people.
- A cybersecurity threat means a harmful attack will occur.
- A cyber vulnerability is a weakness making a target susceptible to attack.
- Cyber threats pose as dangerous to certain industries, and threaten the information collected and protected.
- Examples of data sources include personal information, medical records, education records and financial records
- Cyber criminals target Network services like DNS, HTTP, and online databases.
- Criminals capture data streams with packet-sniffing tools by monitoring and recording network information.
- Criminals use rogue devices, like Wi-Fi access points.
- Packet forgery interferes with network communication, like constructing packets to appear as part of a communication.
- Sectors of the kingdom include: manufacturing, energy production, communication, and transportation systems.
- Everyone needs to safeguard their identity, data, and computing devices and corporations must protect the organization's reputation, data, and customers.
- At the state level, national security and the citizens' safety and well-being are at stake.
- In the U.S., the National Security Agency (NSA) is responsible for intelligence collection and surveillance activities.
- Efforts to protect people often conflicts with their right to privacy.
Cybercrime Growth Factors
- Attacks can come from within or outside of an organization.
- An internal user, such as an employee or contract partner, can be accidental or intentional.
- Internal threats cause greater damage because users have direct access to the building, infrastructure devices, network, data, countermeasures, policies and privileges.
- External threats from amateurs or skilled attackers can exploit vulnerabilities, or use social engineering.
- External attacks exploit weaknesses or vulnerabilities to gain access to internal resources.
- Vulnerabilities of Mobile Devices
- In the past, employees used use company-issued computers connected to a corporate LAN but today, they are using mobile devices
- Bring Your Own Device (BYOD), is a growing trend.
- The inability to manage and update mobile devices poses a threat to organizations that allow employee mobile devices on their networks.
- Internet-of-Things (IoT) is the connection of devices to the Internet.
- IoT connects billions of devices to the Internet, including appliances, motors entertainment devices etc.
- Users need to protect the network and can remotely accesses devices.
- All connections along with expanded storage led data growth.
- Impact of Big Data is the result of data that can be is large and complex, making traditional data processing applications inadequate.
- Three dimensions of Big data include: Volume, velocity and variety
- As a result of corporate hacks, enterprise systems require security product redesigns and upgrades.
- Governments and industries are introducing regulations with better data protection and controls.
Creating More Heroes
- Advanced persistent threat (APT) is a continuous computer hack that occurs under the radar against a specific object and they are chosen for business or political motives.
- Algorithm attacks track system self-reporting data selecting targets or trigger false alerts used to improve energy savings, and efficiencies.
- Attacks select the low hanging fruit or most vulnerable victims, and will only launch if the attacker can match the signatures of the targeted victim.
- Federated Identity refers to multiple enterprises that let users use same identification credentials gaining network access. The goal is to share across castle boundaries.
- The protection method of federated identity is to tie login ability to an authorized device. The dark forces of cyber security, which is why it is so important that there is heightened recognition.
- There are are many safety implications, and emergency call centers in the U.S. are vulnerable that could shut down 911 networks, jeopardizing public safety.
- A telephone denial of service (TDoS) attack uses phone calls against a target telephone.
- The next generation 911 use Voice-over-IP (VoIP) rather then traditional landlines.
- The defenses against cyberattacks at the start of the cyber era were low but now the threat has now has brought greater awareness to more countries.
- In the U.S., National Institute of Standards and Technologies (NIST) created a framework for cybersecurity.
- The WorkForce Framework categorizes cybersecurity jobs into seven categories.
- Operate and Maintain: includes providing the support, maintenance, to ensure IT system performance and security.
- Protect and Defend includes identification, analysis and mitigation to internal systems and networks.
- Investigate includes the investigation of cyber events and/or crimes involving IT resources.
- Collect and Operate includes denial, deception operations, and the collection of cybersecurity information.
- Analyze includes review and evaluation of cybersecurity information.
- Oversight and Development manage and conduct cybersecurity work effectively. Securely Provision includes building IT systems. -There are several specialty areas and define common types of cybersecurity work.
- Cybersecurity specialists must collaborate with professional colleagues frequently and International technology organizations sponsor workshops and conferences.
- It is important to have the same skills as hackers, especially black hat hackers, to protect against attacks.
- There are many skills competitions and organizations for cybersecurity student.
- There is a need for cybersecurity specialist to obtain certifications that provide proof of skills and knowledge level. -CompTIA Security+ certifies the completion of IT administration in information assurance. -EC Council Certified Ethical Hacker provides the level of ability with skills and knowledges for various hacking practices. -SANS CIAC Security Essentials has certification for those that are entry level showing security skills and and concepts with expertise -Is a good test for entry level cybersecurity skills. -The additional certifications are also availbile -(ISC)^2 Certified Information Systems Security Professional (CISSP) has vendor neutral with specialists that have the expertise and managerial experience -ISCA certified, are the cyber heroes responsible for cybersecurity systems that are there for the security. -The company sponsored have a matrix of ciscos certifications with certifications shown in the figure -The cyber security validate the associate of the security skills and knowledge requires to secure Cisco network
Study Advice:
- Learn the basics by completing courses in IT.
- A cybersecurity study guide would advise to be a life-long learner.
- Pursue company sponsored certifications show that one possesses the knowledge needed for employment.
- Seek out security an internship.
- Connect with security organizations, attend meetings and conferences, and join forums and blogs.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
The growth of data has created opportunities for cybersecurity specialists. Businesses now recognize the power of cybersecurity. Several attackers exist with different aims and motivations.