Cybersecurity Principles

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Within the context of cybersecurity, what does the CIA triad primarily aim to ensure?

  • Confidentiality, Integrity, Availability. (correct)
  • Compliance, Integrity, Availability.
  • Confidentiality, Identification, Anonymity.
  • Control, Isolation, Authentication.

Which scenario exemplifies the use of multi-factor authentication?

  • Answering a security question to reset a forgotten password.
  • Entering a password to access an email account.
  • Using a fingerprint scan in conjunction with a PIN to access a banking app. (correct)
  • Receiving an email confirmation after creating a new online account.

What is the primary function of the AAA framework in cybersecurity?

  • Auditing, Archiving, and Analyzing network traffic.
  • Application, Access, and Aggregation of security protocols.
  • Authentication, Authorization, and Accounting of user actions. (correct)
  • Assessment, Approval, and Avoidance of potential threats.

Which of the following best describes a 'threat vector' in the context of cybersecurity?

<p>The method or path an attacker uses to gain access to a system or network. (C)</p> Signup and view all the answers

Which of the following actions would LEAST likely protect against ransomware attacks?

<p>Clicking on links in emails from unrecognized senders to verify their identity. (B)</p> Signup and view all the answers

How does understanding 'threat vectors' assist a cybersecurity technician in protecting an organization's resources?

<p>It allows for the identification of potential pathways attackers might exploit to gain unauthorized access. (C)</p> Signup and view all the answers

Which of the following scenarios represents the most effective application of the AAA framework?

<p>Authenticating users with a username and password, authorizing them based on their role, and auditing their access to sensitive data. (D)</p> Signup and view all the answers

What would be the most effective approach in defending against ransomware attacks?

<p>Regularly backing up critical data to an isolated system and keeping software updated. (B)</p> Signup and view all the answers

What is the primary security risk associated with botnets?

<p>They enable attackers to use compromised devices for large-scale attacks like DDoS or spam campaigns. (B)</p> Signup and view all the answers

An employee receives an email claiming to be from the IT department, requesting immediate password verification through a provided link. What type of security threat does this scenario most likely represent?

<p>A phishing attempt. (D)</p> Signup and view all the answers

Which security goal is MOST directly compromised when a disgruntled employee intentionally modifies sensitive financial records within a company database?

<p>Integrity (A)</p> Signup and view all the answers

A hospital needs to ensure patient data is accessible to doctors during an emergency, even if their primary data center fails. Which of the following availability controls would be MOST effective?

<p>Establishing a redundant, geographically separate backup system. (A)</p> Signup and view all the answers

Which scenario most clearly illustrates a vulnerability within a cyber ecosystem?

<p>A software program contains a coding flaw that allows hackers to inject malicious code. (B)</p> Signup and view all the answers

Which of the following scenarios BEST demonstrates the use of hashing to ensure data integrity?

<p>Calculating an MD5 checksum of a file before and after transmission. (A)</p> Signup and view all the answers

An organization's cybersecurity strategy should primarily aim to mitigate what?

<p>The potential exploitation of system vulnerabilities by cyber threats. (C)</p> Signup and view all the answers

A company wants to enhance the confidentiality of its sensitive data both at rest and in transit. Which combination of security controls would BEST achieve this?

<p>Encryption and access control lists. (D)</p> Signup and view all the answers

What is the difference between a cyber threat and a cyber vulnerability?

<p>A cyber vulnerability is a weakness that can be exploited, while a cyber threat is a potential danger that can exploit the weakness. (B)</p> Signup and view all the answers

An online retailer experiences a Distributed Denial of Service (DDoS) attack, rendering its website inaccessible to customers. Which security principle has been MOST directly violated?

<p>Availability (D)</p> Signup and view all the answers

What is the PRIMARY purpose of implementing version control systems within a software development environment?

<p>To maintain data integrity by tracking and managing changes to code. (C)</p> Signup and view all the answers

Why is cybersecurity crucial for enabling technological innovation?

<p>It facilitates the safe and reliable adoption of new technologies like IoT and AI. (D)</p> Signup and view all the answers

Which of the following scenarios represents the most significant impact of a successful cyberattack on national security?

<p>Disruption of a country's power grid, leading to widespread outages. (A)</p> Signup and view all the answers

Which AAA component is PRIMARILY responsible for verifying a user's identity?

<p>Authentication (D)</p> Signup and view all the answers

What is the main goal of Role-Based Access Control (RBAC)?

<p>To restrict system access based on a user's organizational role. (A)</p> Signup and view all the answers

In the context of cybersecurity, what does 'preserving reputation and trust' primarily involve?

<p>Implementing robust measures to safeguard data and ensure customer confidence. (B)</p> Signup and view all the answers

What is the most appropriate action to take when a cybersecurity technician identifies a vulnerability in a system?

<p>Document the vulnerability, assess its potential impact, and implement remediation measures. (C)</p> Signup and view all the answers

What is the projected impact that cybercrime has on organizations, individuals, and governments?

<p>Cybercrime costs are projected to rise to trillions annually. (D)</p> Signup and view all the answers

Which of the following controls would be MOST effective in maintaining the integrity of sensitive data stored in a database?

<p>Using digital signatures and hashing algorithms to detect unauthorized modifications. (C)</p> Signup and view all the answers

An organization wants to ensure that its critical systems remain operational even during a power outage. Which availability control would be the MOST suitable?

<p>Using redundant power supplies and backup generators. (D)</p> Signup and view all the answers

A company suspects that a disgruntled employee has intentionally altered financial records in a database. Which control would be MOST effective in detecting and auditing these changes?

<p>Implementing audit logs and monitoring systems to track all database modifications. (C)</p> Signup and view all the answers

Which scenario BEST illustrates a violation of the principle of confidentiality?

<p>An unauthorized user gains access to sensitive customer data through a phishing attack. (A)</p> Signup and view all the answers

Which scenario best illustrates how cybersecurity contributes to 'preserving reputation and trust' for an organization?

<p>An organization invests in training employees to identify phishing attempts, preventing potential data leaks and maintaining customer confidence. (C)</p> Signup and view all the answers

How does cybersecurity primarily support 'enabling technological innovation' in modern society?

<p>By creating a safe environment for the development and deployment of new technologies like IoT and AI. (A)</p> Signup and view all the answers

Which of the following scenarios represents the MOST significant threat to data integrity?

<p>An attacker exploits a vulnerability to gain unauthorized access and intentionally modify critical data. (B)</p> Signup and view all the answers

A hospital needs to ensure that patient data is accessible to doctors at all times, even in the event of a system failure. Which availability control would be MOST effective?

<p>Using redundant servers and data replication to ensure data availability. (B)</p> Signup and view all the answers

What is the MOST direct impact of a successful cyberattack on a nation's critical infrastructure, such as its power grid?

<p>Significant financial losses and potential disruption of essential services. (A)</p> Signup and view all the answers

Which of the following actions would BEST protect against Distributed Denial of Service (DDoS) attacks?

<p>Implementing a web application firewall (WAF) with DDoS protection capabilities. (A)</p> Signup and view all the answers

Which scenario BEST demonstrates the difference between a cyber threat and a cyber vulnerability?

<p>A firewall misconfiguration (vulnerability) allows a hacker (threat) to access a database. (D)</p> Signup and view all the answers

How does implementing a robust AAA (Authentication, Authorization, and Accounting) framework enhance cybersecurity?

<p>By providing a structured approach to verify user identity, grant appropriate access, and track user activities. (D)</p> Signup and view all the answers

An organization prioritizes protecting its sensitive customer data to avoid financial losses and maintain customer trust. Which security goals align with this objective?

<p>Confidentiality and Integrity. (A)</p> Signup and view all the answers

Why is understanding the 'cyber ecosystem' important for a cybersecurity technician?

<p>It provides a comprehensive view of interconnected systems, devices, and users, allowing for more effective security strategies. (A)</p> Signup and view all the answers

What is the MOST effective way to mitigate a 'security risk'?

<p>Implementing controls to reduce the likelihood or impact of the associated threat exploiting a vulnerability. (A)</p> Signup and view all the answers

A company wants to implement a cybersecurity strategy that not only protects data but also ensures they can trace any unauthorized activity back to a specific user. Which security principle is MOST relevant?

<p>Non-repudiation. (C)</p> Signup and view all the answers

An organization discovers a new vulnerability in their web server software. What is the MOST effective immediate action to mitigate the risk associated with this vulnerability?

<p>Immediately apply the vendor-supplied patch or implement a workaround if a patch is unavailable. (C)</p> Signup and view all the answers

A cybersecurity technician is designing a system to protect sensitive data. Which approach BEST balances security with usability?

<p>Restricting access to data based on the principle of least privilege and regularly auditing user permissions. (D)</p> Signup and view all the answers

Which action would LEAST likely protect against ransomware attacks?

<p>Disabling all network firewalls to improve network performance. (C)</p> Signup and view all the answers

An organization observes a sudden increase in outbound network traffic to unusual IP addresses, coupled with multiple failed login attempts on various systems. What type of security threat does this most likely indicate?

<p>A botnet infection attempting to spread or carry out malicious activities. (A)</p> Signup and view all the answers

A cybersecurity technician discovers that several employees have fallen victim to a phishing campaign, resulting in compromised user credentials. What is the MOST effective immediate step to contain the incident?

<p>Isolate affected systems from the network and revoke the compromised credentials. (D)</p> Signup and view all the answers

Flashcards

CIA Triad

Confidentiality, Integrity, and Availability. These are the core principles of information security.

AAA Framework

Authentication, Authorization, and Accounting. These are the five critical elements in AAA framework.

Multi-Factor Authentication

Using more than one method of authentication to verify a user's identity.

Threat Vector

A path or method that attackers use to gain access to a system or network.

Signup and view all the flashcards

Ransomware

A type of malware that encrypts a victim's files and demands a ransom to restore access.

Signup and view all the flashcards

Cybersecurity

Protecting computer systems and networks from information disclosure, theft, or damage.

Signup and view all the flashcards

Information Security Threat

Something that could potentially harm a system or organization.

Signup and view all the flashcards

Vulnerability

A weakness or gap in security defenses that a threat can exploit.

Signup and view all the flashcards

Example of Multi-Factor Authentication

Using multiple verification methods across different categories (something you know, something you have, or something you are).

Signup and view all the flashcards

Botnet

A network of infected computers controlled by a hacker to perform malicious tasks.

Signup and view all the flashcards

Cybersecurity Definition

Protecting cyberspace from cyber threats and vulnerabilities.

Signup and view all the flashcards

Cyberspace

A complex network of activities carried out through interconnected computer systems and devices.

Signup and view all the flashcards

Cyber Threat

Unauthorized access, data theft, system takeover, or malicious code propagation.

Signup and view all the flashcards

Cyber Vulnerability

A weakness or loophole in systems that can lead to cyberattacks.

Signup and view all the flashcards

Security Risk

The potential for harm or loss to an organization's assets due to exploitable vulnerabilities.

Signup and view all the flashcards

Protecting Sensitive Data

Protecting personal, financial, and business information from breaches.

Signup and view all the flashcards

National Security (Cyber)

Defending against cyberattacks targeting critical infrastructure.

Signup and view all the flashcards

Preserving Reputation

Robust cybersecurity measures preserving customer trust and brand value.

Signup and view all the flashcards

Confidentiality

Ensuring data is accessible only to authorized individuals or systems.

Signup and view all the flashcards

Integrity

Ensuring data remains accurate, consistent, and unaltered unless authorized.

Signup and view all the flashcards

Availability

Ensuring systems, services, and data are accessible when needed by authorized users.

Signup and view all the flashcards

Confidentiality Failure

Unauthorized access, weak passwords and data leaks can cause this to fail.

Signup and view all the flashcards

Integrity Failure

Intentional alteration, user error or a software error can cause this to fail.

Signup and view all the flashcards

Availability Failure

Distributed Denial of Service (DDoS) attacks, hardware failures, and natural disasters can cause this to fail.

Signup and view all the flashcards

Encryption

Encryption is used to protect data at rest and in transit.

Signup and view all the flashcards

Availability Controls

A security measure consisting of redundancy, load balancing and regular maintenance.

Signup and view all the flashcards

Access controls

Ensures that only authenticated users are granted access to resources.

Signup and view all the flashcards

RBAC Definition

Role-Based Access Control.

Signup and view all the flashcards

Data Protection

Protecting personal, financial, and confidential business information from unauthorized access.

Signup and view all the flashcards

National Security

Defending vital systems like power grids and healthcare networks from online attacks.

Signup and view all the flashcards

Reputation Preservation

Maintaining customer trust and brand reputation through effective cybersecurity measures.

Signup and view all the flashcards

Social Engineering

Exploiting human psychology to trick individuals into divulging confidential information.

Signup and view all the flashcards

Multi-Factor Authentication (MFA)

Verifying a user's identity using multiple independent authentication factors.

Signup and view all the flashcards

Study Notes

  • A threat is a potential occurrence that can damage and disrupt operations and activities.
  • Threat actors use cyber threats to infiltrate and steal data, such as personal information, financial data, and login credentials.

Threat Sources

  • Threats can originate from:
    • Natural events like fires, floods, and power failures
    • Unintentional actions by unskilled administrators, accidents, or untrained employees
    • Intentional acts from both internal (disgruntled employees, service providers, contractors) and external sources (hackers, criminals, terrorists).

Threat Actors/Agents

  • Black Hats: Extraordinary skills, engage in malicious/destructive activities.
  • White Hats: Use hacking skills defensively, are also known as security analysts.
  • Gray Hats: Work offensively and defensively.
  • Suicide Hackers: Not worried of jail and aim to bring down critical infrastructure
  • Script Kiddies: Lacking skills and use scripts/tools developed by others.
  • Cyber Terrorists: Motivated by religious or political beliefs, aiming to cause fear through disruption.
  • State-Sponsored Hackers: Government employed, to penetrate information systems.
  • Hacktivists: Promote a political agenda by defacing or disabling websites.
  • Hacker Teams: Skilled hackers jointly researching.
  • Industrial Spies: Corporate espionage through competitor spying to steal information.
  • Insiders: Trusted employees who may violate rules or cause harm with their access.
  • Criminal Syndicates: Groups performing planned long term embezzling through sophisticated attacks
  • Organized Hackers: Rented criminals to piffer money from victims

Attributes of Threat Actors

  • Internal: Trusted insiders with authorized access
  • External: Outsiders without authorized access.
  • Highly sophisticated threat actors are more successful.
  • Resources/funding: How attacks are support financially
  • Intent/motivation: Actors can be connected to political or personal goals

Threat Vectors

  • A threat vector is a medium through which an attacker gains system access
  • Direct access, removable media, wireless connections, and email.
  • Cloud services, ransomware/malware, supply chain, and business partners.

Malware Details

  • Malware that damages or disables computer systems, giving limited or full control creating theft and aud
  • Malware may track websites visited, degrade system performance, cause hardware failure, or steal data.
  • The distribution includes instant messenger applications, downloading files, portable hardware, bugs in software, untrusted sites, and bluetooth.

Detailed Components of Malware

  • Crypter to protect from reverse engineering.
  • Downloader to get malware from the Internet.
  • Dropper to install malware files covertly.
  • Exploit to access info or install malware.
  • Injector to inject code into other vulnerable running processes and changes how they execute to hide or prevent its removal
  • Obfuscator to conceal code and purpose.
  • Packer to bundle file for security bypass.
  • Payload that controls a computer system.
  • Malicious Code can steal data and create backdoors

Types of Malware

  • Trojans, viruses, ransomware, computer worms, rootkits, PUAs, spyware, keyloggers and fileless malware.

Identifying Trojan activity

  • Computer blinks, settings change, websites open without user input, antivirus turns off and popup appears

Default Passwords

  • Change password when prompted
  • Do not change password (unsecure) and leave as default (brute force attack)

System Sprawling

  • Vulnerability rises within a organizational network an increases.

Operating System Flaws

- Attacks uses OS systems, trojans and spyware
- Results to data theft and manipulation

Network Security

  • Security policies implemented to keep consistent for implementation, awareness and lack of information </existing_notes>

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

CIA Triad in Cybersecurity
16 questions
Cybersecurity: CIA Triad
29 questions

Cybersecurity: CIA Triad

LegendaryOnyx4767 avatar
LegendaryOnyx4767
Information Security: CIA Triad and Defense
40 questions
Use Quizgecko on...
Browser
Browser