Podcast
Questions and Answers
Which of these policies defines permissible activities for users within an organization, helping prevent misuse of IT resources?
Which of these policies defines permissible activities for users within an organization, helping prevent misuse of IT resources?
Which regulation focuses on protecting patient data in the U.S. healthcare sector?
Which regulation focuses on protecting patient data in the U.S. healthcare sector?
What does 'GDPR' stand for?
What does 'GDPR' stand for?
Which of the following is NOT a key area covered by cybersecurity policies?
Which of the following is NOT a key area covered by cybersecurity policies?
Signup and view all the answers
Which regulation is specifically designed to protect sensitive data within U.S. federal agencies?
Which regulation is specifically designed to protect sensitive data within U.S. federal agencies?
Signup and view all the answers
What is the primary goal of 'Security Awareness Training' in cybersecurity?
What is the primary goal of 'Security Awareness Training' in cybersecurity?
Signup and view all the answers
Which of the following options are NOT considered critical infrastructure under the 'Critical Infrastructure Protection' framework?
Which of the following options are NOT considered critical infrastructure under the 'Critical Infrastructure Protection' framework?
Signup and view all the answers
What is the primary function of a digital signature in cryptography?
What is the primary function of a digital signature in cryptography?
Signup and view all the answers
Which of the following is NOT a key component of Disaster Recovery (DR)?
Which of the following is NOT a key component of Disaster Recovery (DR)?
Signup and view all the answers
How do government regulations impact private sector security practices?
How do government regulations impact private sector security practices?
Signup and view all the answers
Which of the following is NOT a common vulnerability exploited by attackers?
Which of the following is NOT a common vulnerability exploited by attackers?
Signup and view all the answers
How does Symmetric Encryption differ from Asymmetric Encryption?
How does Symmetric Encryption differ from Asymmetric Encryption?
Signup and view all the answers
What is the primary goal of Risk Management?
What is the primary goal of Risk Management?
Signup and view all the answers
What is the purpose of input validation in software security?
What is the purpose of input validation in software security?
Signup and view all the answers
In which stage of incident response does the focus shift from containing the damage to restoring systems to their normal operating state?
In which stage of incident response does the focus shift from containing the damage to restoring systems to their normal operating state?
Signup and view all the answers
What does "SQL Injection" refer to in the context of application vulnerabilities?
What does "SQL Injection" refer to in the context of application vulnerabilities?
Signup and view all the answers
Which access control mechanism grants access based on a user's role within an organization?
Which access control mechanism grants access based on a user's role within an organization?
Signup and view all the answers
Which of the following is a common mitigation technique for software vulnerabilities?
Which of the following is a common mitigation technique for software vulnerabilities?
Signup and view all the answers
Which of the following is NOT a valid risk mitigation strategy?
Which of the following is NOT a valid risk mitigation strategy?
Signup and view all the answers
What is the purpose of encryption?
What is the purpose of encryption?
Signup and view all the answers
What is the role of PKI (Public Key Infrastructure) in cryptography?
What is the role of PKI (Public Key Infrastructure) in cryptography?
Signup and view all the answers
Which of the following is NOT a core principle of cryptography?
Which of the following is NOT a core principle of cryptography?
Signup and view all the answers
Which of the following actions is typically performed during the Containment stage of incident response?
Which of the following actions is typically performed during the Containment stage of incident response?
Signup and view all the answers
Which access control mechanism allows resource owners to set permissions for their resources?
Which access control mechanism allows resource owners to set permissions for their resources?
Signup and view all the answers
What does a "layered defense" approach in cybersecurity involve?
What does a "layered defense" approach in cybersecurity involve?
Signup and view all the answers
Why is integrating cybersecurity into business operations important?
Why is integrating cybersecurity into business operations important?
Signup and view all the answers
What is the main focus of a Zero Trust architecture in cybersecurity?
What is the main focus of a Zero Trust architecture in cybersecurity?
Signup and view all the answers
Which of the following is NOT a benefit of using AI and ML in cybersecurity?
Which of the following is NOT a benefit of using AI and ML in cybersecurity?
Signup and view all the answers
What is the main purpose of cybersecurity standards and frameworks?
What is the main purpose of cybersecurity standards and frameworks?
Signup and view all the answers
How do security awareness training programs contribute to a holistic security approach?
How do security awareness training programs contribute to a holistic security approach?
Signup and view all the answers
What is the role of incident response and recovery planning in a holistic security approach?
What is the role of incident response and recovery planning in a holistic security approach?
Signup and view all the answers
Which of the following is NOT a key aspect of a holistic security approach?
Which of the following is NOT a key aspect of a holistic security approach?
Signup and view all the answers
Which of these regulations focuses on data protection for California residents?
Which of these regulations focuses on data protection for California residents?
Signup and view all the answers
What is a key principle emphasized by the GDPR?
What is a key principle emphasized by the GDPR?
Signup and view all the answers
What is the primary motivation behind government regulation of information technology?
What is the primary motivation behind government regulation of information technology?
Signup and view all the answers
Which of the following is NOT a key area typically addressed by government regulations in the realm of information technology?
Which of the following is NOT a key area typically addressed by government regulations in the realm of information technology?
Signup and view all the answers
What is the primary goal of the 'right to be forgotten' provision of the GDPR?
What is the primary goal of the 'right to be forgotten' provision of the GDPR?
Signup and view all the answers
What is the main reason for governments enacting data privacy regulations?
What is the main reason for governments enacting data privacy regulations?
Signup and view all the answers
Which of the following is a notable aspect of the GDPR's enforcement mechanism?
Which of the following is a notable aspect of the GDPR's enforcement mechanism?
Signup and view all the answers
What is the main challenge that government regulations strive to address when it comes to information technology?
What is the main challenge that government regulations strive to address when it comes to information technology?
Signup and view all the answers
What is a defining characteristic of an Advanced Persistent Threat (APT)?
What is a defining characteristic of an Advanced Persistent Threat (APT)?
Signup and view all the answers
Which of the following is NOT a primary motive for cybersecurity incidents?
Which of the following is NOT a primary motive for cybersecurity incidents?
Signup and view all the answers
What do Insider Threats and Advanced Persistent Threats (APTs) have in common?
What do Insider Threats and Advanced Persistent Threats (APTs) have in common?
Signup and view all the answers
Which of the following describes a scenario where a Zero-Day Exploit is most likely to be used?
Which of the following describes a scenario where a Zero-Day Exploit is most likely to be used?
Signup and view all the answers
Cyber-espionage is primarily motivated by:
Cyber-espionage is primarily motivated by:
Signup and view all the answers
Which of the following is NOT a characteristic of Hacktivists?
Which of the following is NOT a characteristic of Hacktivists?
Signup and view all the answers
What type of attack is most likely to involve the exfiltration of sensitive data from a target system?
What type of attack is most likely to involve the exfiltration of sensitive data from a target system?
Signup and view all the answers
Which scenario BEST describes the use of cyber tools for 'Cyber Warfare and Intelligence Gathering'?
Which scenario BEST describes the use of cyber tools for 'Cyber Warfare and Intelligence Gathering'?
Signup and view all the answers
Study Notes
Cybersecurity (CYB 201)
- Cybersecurity is about protecting digital assets (systems, data, and networks) from unauthorized access, breaches, and failures.
- Key concepts include: Cyber, Security, Confidentiality, Integrity, and Availability.
- Cyber: Refers to the digital or networked environment.
- Security: Protecting data and systems from unauthorized access or disruption.
-
Confidentiality: Access restricted to authorized individuals only.
- Techniques include encryption (converting data into secure format, readable only by some with decryption key) and access control (restricting based on user roles and permissions).
-
Integrity: Ensures data is accurate, complete, and unaltered.
- Techniques include hashing (unique digital fingerprints, changing if data modified), checksums, and digital signatures (using algorithms and cryptographic keys).
-
Availability: Ensuring systems, data, and services are readily available to authorized users.
- Methods include redundant systems (backup servers and data replication) for system failures.
-
Authentication: Verifying a user, device, or system's identity before granting access.
- Methods include passwords, PINs, multi-factor authentication (MFA), and biometrics (fingerprints, facial recognition).
-
Access Control: Regulating user access to resources based on roles, permissions, and
policies.
- Types include Role-Based Access Control (RBAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC).
-
Non-repudiation: Ensures actions cannot be denied later.
- Techniques include digital signatures.
-
Fault-tolerant methodologies: Designing systems to continue operating even with
component failures.
- Methods include redundancy, failover systems, load balancing, backups, and DDoS protection.
- Network Resilience: Maintaining service during high traffic or attacks.
- Data Replication: Synchronizing data across multiple locations.
- Failover Systems: Automatically switching operations to a backup system when the primary fails.
- Load Balancing: Distributing network/application traffic across multiple servers.
- Backups: Regularly storing copies of data in a secure, separate location.
- DDoS Protection: Protecting against distributed denial-of-service (DDoS) attacks that overload systems.
- Network Segmentation: Isolating network segments to limit the impact of breaches.
Fault-Tolerant Methodologies in Cybersecurity
- Fault tolerance: Designing systems to continue functioning even in component failure.
- Redundancy: Duplicate critical system components (servers, databases, etc.).
- Failover systems: Automatic switching to backup systems.
- Load balancing: Distributing traffic across multiple servers.
- Backups: Ensuring data recovery if the primary system fails.
- DDoS protection: Protecting against distributed denial-of-service attacks.
- Network segmentation: Isolating segments to limit malicious network impacts.
Security Policies and Best Practices
- Security policies: Formal documents defining an organization's security approach.
- Acceptable Use Policy (AUP): Defines acceptable employee activities on company devices and networks.
- Data Protection Policy: Specifies how sensitive data should be handled, stored, and moved.
- Incident Response Policy: Outlines steps to handle security incidents.
Testing Security and Incident Response
- Vulnerability Scanning: Automated tools scan systems for known vulnerabilities.
- Penetration Testing (Pen Testing): Ethical hackers simulate attacks to find and highlight weaknesses.
- Red Team Exercises: Specialized teams conduct complex simulated attacks to test defences.
- Security Audits: Comprehensive reviews of security practices, policies, and infrastructure.
-
Incident Response (IR): Plan to detect, analyse and respond to security incidents.
- Stages: Preparation, Identification, Containment, Eradication, Recovery, and Post-incident Review.
Risk Management and Disaster Recovery
-
Risk Management: Identifying, assessing, and mitigating risks to an organisation's
assets.
- Stages: Risk Assessment, Risk Mitigation, Risk Acceptance, Risk Transfer.
-
Disaster Recovery (DR): Restoring operations after a critical incident (cyberattack,
natural disaster, or outage).
- DR components include backups, failover systems, business continuity planning (BCP), and DR drills.
Access Control
- Access Control: Regulates user access based on roles, permissions, and policies.
- Role-Based Access Control (RBAC): Granting access based on user roles, within an organisation.
- Mandatory Access Control (MAC): Centralized policies restrict access based on data classifications.
- Discretionary Access Control (DAC): Allows resource owners to set permissions for their resources.
Basic Cryptography
- Cryptography: Securing data to make it unreadable to unauthorized access.
- Key cryptographic concepts include: Encryption (converting data into secure format), Symmetric Encryption(using single key for encryption and decryption), Asymmetric Encryption(using public and private key), Hashing (creating a fixed-length fingerprint for data integrity), and Digital Signatures (using asymmetric cryptography for data integrity and authentication).
Software Application Vulnerabilities
-
SQL Injection: Attackers inject malicious SQL code into vulnerable input fields.
-
Cross-Site Scripting (XSS): Malicious scripts injected into webpages,viewed by other users.
-
Buffer Overflow: Writing more data to a buffer than its capacity.
-
Insecure Deserialization: Untrusted data deserialized into objects.
-
Broken Authentication: Improper authentication mechanism.
-
Sensitive Data Exposure: Disclosure of sensitive data in applications.
-
Missing Function Level Access Control: Vulnerable access based on user input roles accessing unauthorised data
-
Command Injection: Attacker inputs malicious commands from user input into an application.
-
Path Traversal: Allows attackers to access files outside intended directories.
-
Race Conditions: Unpredictable behaviour from concurrent actions.
-
Insufficient Logging & Monitoring: Deficient logging & monitoring for security incident detection.
Evolution of Cyber-Attacks
- Early attacks (1980s-1990s): simple viruses and worms.
- Organised crime and financial motives (2000s): attacks for financial gain
- Advanced Persistent Threats (APTs) and Nation-State attacks (2010s): complex, targeted, long-term operations for espionage
- Targeted ransomware and supply chain attacks (2020s): sophisticated, large-scale attacks on critical infrastructure and supply chains.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on critical cybersecurity policies and regulations. This quiz covers various aspects of IT resource management, data protection laws, and the importance of security practices within organizations. Challenge yourself with questions on GDPR, Risk Management, and more.