Podcast
Questions and Answers
Which of these policies defines permissible activities for users within an organization, helping prevent misuse of IT resources?
Which of these policies defines permissible activities for users within an organization, helping prevent misuse of IT resources?
- Acceptable Use Policies (correct)
- Access Control Policies
- Incident Response Policies
- Data Protection Policies
Which regulation focuses on protecting patient data in the U.S. healthcare sector?
Which regulation focuses on protecting patient data in the U.S. healthcare sector?
- Payment Card Industry Data Security Standard (PCI DSS)
- Federal Information Security Management Act (FISMA)
- Health Insurance Portability and Accountability Act (HIPAA) (correct)
- General Data Protection Regulation (GDPR)
What does 'GDPR' stand for?
What does 'GDPR' stand for?
- Government Digital Protection Regulations
- Government Data Protection Regulation
- Global Data Privacy Regulation
- General Data Protection Regulation (correct)
Which of the following is NOT a key area covered by cybersecurity policies?
Which of the following is NOT a key area covered by cybersecurity policies?
Which regulation is specifically designed to protect sensitive data within U.S. federal agencies?
Which regulation is specifically designed to protect sensitive data within U.S. federal agencies?
What is the primary goal of 'Security Awareness Training' in cybersecurity?
What is the primary goal of 'Security Awareness Training' in cybersecurity?
Which of the following options are NOT considered critical infrastructure under the 'Critical Infrastructure Protection' framework?
Which of the following options are NOT considered critical infrastructure under the 'Critical Infrastructure Protection' framework?
What is the primary function of a digital signature in cryptography?
What is the primary function of a digital signature in cryptography?
Which of the following is NOT a key component of Disaster Recovery (DR)?
Which of the following is NOT a key component of Disaster Recovery (DR)?
How do government regulations impact private sector security practices?
How do government regulations impact private sector security practices?
Which of the following is NOT a common vulnerability exploited by attackers?
Which of the following is NOT a common vulnerability exploited by attackers?
How does Symmetric Encryption differ from Asymmetric Encryption?
How does Symmetric Encryption differ from Asymmetric Encryption?
What is the primary goal of Risk Management?
What is the primary goal of Risk Management?
What is the purpose of input validation in software security?
What is the purpose of input validation in software security?
In which stage of incident response does the focus shift from containing the damage to restoring systems to their normal operating state?
In which stage of incident response does the focus shift from containing the damage to restoring systems to their normal operating state?
What does "SQL Injection" refer to in the context of application vulnerabilities?
What does "SQL Injection" refer to in the context of application vulnerabilities?
Which access control mechanism grants access based on a user's role within an organization?
Which access control mechanism grants access based on a user's role within an organization?
Which of the following is a common mitigation technique for software vulnerabilities?
Which of the following is a common mitigation technique for software vulnerabilities?
Which of the following is NOT a valid risk mitigation strategy?
Which of the following is NOT a valid risk mitigation strategy?
What is the purpose of encryption?
What is the purpose of encryption?
What is the role of PKI (Public Key Infrastructure) in cryptography?
What is the role of PKI (Public Key Infrastructure) in cryptography?
Which of the following is NOT a core principle of cryptography?
Which of the following is NOT a core principle of cryptography?
Which of the following actions is typically performed during the Containment stage of incident response?
Which of the following actions is typically performed during the Containment stage of incident response?
Which access control mechanism allows resource owners to set permissions for their resources?
Which access control mechanism allows resource owners to set permissions for their resources?
What does a "layered defense" approach in cybersecurity involve?
What does a "layered defense" approach in cybersecurity involve?
Why is integrating cybersecurity into business operations important?
Why is integrating cybersecurity into business operations important?
What is the main focus of a Zero Trust architecture in cybersecurity?
What is the main focus of a Zero Trust architecture in cybersecurity?
Which of the following is NOT a benefit of using AI and ML in cybersecurity?
Which of the following is NOT a benefit of using AI and ML in cybersecurity?
What is the main purpose of cybersecurity standards and frameworks?
What is the main purpose of cybersecurity standards and frameworks?
How do security awareness training programs contribute to a holistic security approach?
How do security awareness training programs contribute to a holistic security approach?
What is the role of incident response and recovery planning in a holistic security approach?
What is the role of incident response and recovery planning in a holistic security approach?
Which of the following is NOT a key aspect of a holistic security approach?
Which of the following is NOT a key aspect of a holistic security approach?
Which of these regulations focuses on data protection for California residents?
Which of these regulations focuses on data protection for California residents?
What is a key principle emphasized by the GDPR?
What is a key principle emphasized by the GDPR?
What is the primary motivation behind government regulation of information technology?
What is the primary motivation behind government regulation of information technology?
Which of the following is NOT a key area typically addressed by government regulations in the realm of information technology?
Which of the following is NOT a key area typically addressed by government regulations in the realm of information technology?
What is the primary goal of the 'right to be forgotten' provision of the GDPR?
What is the primary goal of the 'right to be forgotten' provision of the GDPR?
What is the main reason for governments enacting data privacy regulations?
What is the main reason for governments enacting data privacy regulations?
Which of the following is a notable aspect of the GDPR's enforcement mechanism?
Which of the following is a notable aspect of the GDPR's enforcement mechanism?
What is the main challenge that government regulations strive to address when it comes to information technology?
What is the main challenge that government regulations strive to address when it comes to information technology?
What is a defining characteristic of an Advanced Persistent Threat (APT)?
What is a defining characteristic of an Advanced Persistent Threat (APT)?
Which of the following is NOT a primary motive for cybersecurity incidents?
Which of the following is NOT a primary motive for cybersecurity incidents?
What do Insider Threats and Advanced Persistent Threats (APTs) have in common?
What do Insider Threats and Advanced Persistent Threats (APTs) have in common?
Which of the following describes a scenario where a Zero-Day Exploit is most likely to be used?
Which of the following describes a scenario where a Zero-Day Exploit is most likely to be used?
Cyber-espionage is primarily motivated by:
Cyber-espionage is primarily motivated by:
Which of the following is NOT a characteristic of Hacktivists?
Which of the following is NOT a characteristic of Hacktivists?
What type of attack is most likely to involve the exfiltration of sensitive data from a target system?
What type of attack is most likely to involve the exfiltration of sensitive data from a target system?
Which scenario BEST describes the use of cyber tools for 'Cyber Warfare and Intelligence Gathering'?
Which scenario BEST describes the use of cyber tools for 'Cyber Warfare and Intelligence Gathering'?
Flashcards
Incident Identification
Incident Identification
Detecting and analyzing potential security incidents using monitoring tools and alerts.
Containment
Containment
Isolating affected systems to prevent the spread of an attack.
Eradication
Eradication
Removing malicious elements and addressing vulnerabilities from the system.
Recovery
Recovery
Signup and view all the flashcards
Risk Management
Risk Management
Signup and view all the flashcards
Disaster Recovery (DR)
Disaster Recovery (DR)
Signup and view all the flashcards
Access Control
Access Control
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
Cybersecurity Policy
Cybersecurity Policy
Signup and view all the flashcards
Data Protection Policies
Data Protection Policies
Signup and view all the flashcards
Access Control Policies
Access Control Policies
Signup and view all the flashcards
Incident Response Policies
Incident Response Policies
Signup and view all the flashcards
Acceptable Use Policies (AUP)
Acceptable Use Policies (AUP)
Signup and view all the flashcards
Security Awareness Training
Security Awareness Training
Signup and view all the flashcards
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Signup and view all the flashcards
Health Insurance Portability and Accountability Act (HIPAA)
Health Insurance Portability and Accountability Act (HIPAA)
Signup and view all the flashcards
Zero-Day Exploits
Zero-Day Exploits
Signup and view all the flashcards
Insider Threats
Insider Threats
Signup and view all the flashcards
Advanced Persistent Threats (APTs)
Advanced Persistent Threats (APTs)
Signup and view all the flashcards
Financial Gain Motives
Financial Gain Motives
Signup and view all the flashcards
Political and Ideological Agendas
Political and Ideological Agendas
Signup and view all the flashcards
Corporate Espionage
Corporate Espionage
Signup and view all the flashcards
Cyber Warfare
Cyber Warfare
Signup and view all the flashcards
Revenge or Sabotage
Revenge or Sabotage
Signup and view all the flashcards
5G Vulnerabilities
5G Vulnerabilities
Signup and view all the flashcards
Geopolitical Tensions
Geopolitical Tensions
Signup and view all the flashcards
Data Privacy Regulations
Data Privacy Regulations
Signup and view all the flashcards
GDPR
GDPR
Signup and view all the flashcards
CCPA
CCPA
Signup and view all the flashcards
Cybersecurity Investment
Cybersecurity Investment
Signup and view all the flashcards
Digital Platform Regulations
Digital Platform Regulations
Signup and view all the flashcards
Layered Defense
Layered Defense
Signup and view all the flashcards
Integration of Cybersecurity
Integration of Cybersecurity
Signup and view all the flashcards
Incident Response Planning
Incident Response Planning
Signup and view all the flashcards
Regular Testing and Drills
Regular Testing and Drills
Signup and view all the flashcards
AI and Machine Learning in Security
AI and Machine Learning in Security
Signup and view all the flashcards
Zero Trust Architecture
Zero Trust Architecture
Signup and view all the flashcards
Standards and Frameworks
Standards and Frameworks
Signup and view all the flashcards
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control (ABAC)
Signup and view all the flashcards
Symmetric Encryption
Symmetric Encryption
Signup and view all the flashcards
Asymmetric Encryption
Asymmetric Encryption
Signup and view all the flashcards
Hashing
Hashing
Signup and view all the flashcards
Digital Signatures
Digital Signatures
Signup and view all the flashcards
SQL Injection
SQL Injection
Signup and view all the flashcards
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
Signup and view all the flashcards
Input Validation
Input Validation
Signup and view all the flashcards
Study Notes
Cybersecurity (CYB 201)
- Cybersecurity is about protecting digital assets (systems, data, and networks) from unauthorized access, breaches, and failures.
- Key concepts include: Cyber, Security, Confidentiality, Integrity, and Availability.
- Cyber: Refers to the digital or networked environment.
- Security: Protecting data and systems from unauthorized access or disruption.
- Confidentiality: Access restricted to authorized individuals only.
- Techniques include encryption (converting data into secure format, readable only by some with decryption key) and access control (restricting based on user roles and permissions).
- Integrity: Ensures data is accurate, complete, and unaltered.
- Techniques include hashing (unique digital fingerprints, changing if data modified), checksums, and digital signatures (using algorithms and cryptographic keys).
- Availability: Ensuring systems, data, and services are readily available to authorized users.
- Methods include redundant systems (backup servers and data replication) for system failures.
- Authentication: Verifying a user, device, or system's identity before granting access.
- Methods include passwords, PINs, multi-factor authentication (MFA), and biometrics (fingerprints, facial recognition).
- Access Control: Regulating user access to resources based on roles, permissions, and
policies.
- Types include Role-Based Access Control (RBAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC).
- Non-repudiation: Ensures actions cannot be denied later.
- Techniques include digital signatures.
- Fault-tolerant methodologies: Designing systems to continue operating even with
component failures.
- Methods include redundancy, failover systems, load balancing, backups, and DDoS protection.
- Network Resilience: Maintaining service during high traffic or attacks.
- Data Replication: Synchronizing data across multiple locations.
- Failover Systems: Automatically switching operations to a backup system when the primary fails.
- Load Balancing: Distributing network/application traffic across multiple servers.
- Backups: Regularly storing copies of data in a secure, separate location.
- DDoS Protection: Protecting against distributed denial-of-service (DDoS) attacks that overload systems.
- Network Segmentation: Isolating network segments to limit the impact of breaches.
Fault-Tolerant Methodologies in Cybersecurity
- Fault tolerance: Designing systems to continue functioning even in component failure.
- Redundancy: Duplicate critical system components (servers, databases, etc.).
- Failover systems: Automatic switching to backup systems.
- Load balancing: Distributing traffic across multiple servers.
- Backups: Ensuring data recovery if the primary system fails.
- DDoS protection: Protecting against distributed denial-of-service attacks.
- Network segmentation: Isolating segments to limit malicious network impacts.
Security Policies and Best Practices
- Security policies: Formal documents defining an organization's security approach.
- Acceptable Use Policy (AUP): Defines acceptable employee activities on company devices and networks.
- Data Protection Policy: Specifies how sensitive data should be handled, stored, and moved.
- Incident Response Policy: Outlines steps to handle security incidents.
Testing Security and Incident Response
- Vulnerability Scanning: Automated tools scan systems for known vulnerabilities.
- Penetration Testing (Pen Testing): Ethical hackers simulate attacks to find and highlight weaknesses.
- Red Team Exercises: Specialized teams conduct complex simulated attacks to test defences.
- Security Audits: Comprehensive reviews of security practices, policies, and infrastructure.
- Incident Response (IR): Plan to detect, analyse and respond to security incidents.
- Stages: Preparation, Identification, Containment, Eradication, Recovery, and Post-incident Review.
Risk Management and Disaster Recovery
- Risk Management: Identifying, assessing, and mitigating risks to an organisation's
assets.
- Stages: Risk Assessment, Risk Mitigation, Risk Acceptance, Risk Transfer.
- Disaster Recovery (DR): Restoring operations after a critical incident (cyberattack,
natural disaster, or outage).
- DR components include backups, failover systems, business continuity planning (BCP), and DR drills.
Access Control
- Access Control: Regulates user access based on roles, permissions, and policies.
- Role-Based Access Control (RBAC): Granting access based on user roles, within an organisation.
- Mandatory Access Control (MAC): Centralized policies restrict access based on data classifications.
- Discretionary Access Control (DAC): Allows resource owners to set permissions for their resources.
Basic Cryptography
- Cryptography: Securing data to make it unreadable to unauthorized access.
- Key cryptographic concepts include: Encryption (converting data into secure format), Symmetric Encryption(using single key for encryption and decryption), Asymmetric Encryption(using public and private key), Hashing (creating a fixed-length fingerprint for data integrity), and Digital Signatures (using asymmetric cryptography for data integrity and authentication).
Software Application Vulnerabilities
-
SQL Injection: Attackers inject malicious SQL code into vulnerable input fields.
-
Cross-Site Scripting (XSS): Malicious scripts injected into webpages,viewed by other users.
-
Buffer Overflow: Writing more data to a buffer than its capacity.
-
Insecure Deserialization: Untrusted data deserialized into objects.
-
Broken Authentication: Improper authentication mechanism.
-
Sensitive Data Exposure: Disclosure of sensitive data in applications.
-
Missing Function Level Access Control: Vulnerable access based on user input roles accessing unauthorised data
-
Command Injection: Attacker inputs malicious commands from user input into an application.
-
Path Traversal: Allows attackers to access files outside intended directories.
-
Race Conditions: Unpredictable behaviour from concurrent actions.
-
Insufficient Logging & Monitoring: Deficient logging & monitoring for security incident detection.
Evolution of Cyber-Attacks
- Early attacks (1980s-1990s): simple viruses and worms.
- Organised crime and financial motives (2000s): attacks for financial gain
- Advanced Persistent Threats (APTs) and Nation-State attacks (2010s): complex, targeted, long-term operations for espionage
- Targeted ransomware and supply chain attacks (2020s): sophisticated, large-scale attacks on critical infrastructure and supply chains.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.