Podcast
Questions and Answers
What is the primary focus of cyber security?
What is the primary focus of cyber security?
Why has cyber security become more critical in recent years?
Why has cyber security become more critical in recent years?
What are potential consequences of cyber security breaches for businesses?
What are potential consequences of cyber security breaches for businesses?
What aspect of data is a key concern of cyber security, along with privacy and confidentiality?
What aspect of data is a key concern of cyber security, along with privacy and confidentiality?
Signup and view all the answers
What was the approximate percentage of businesses experiencing cyber-attacks in 2017?
What was the approximate percentage of businesses experiencing cyber-attacks in 2017?
Signup and view all the answers
What does the term 'cyber security' primarily involve?
What does the term 'cyber security' primarily involve?
Signup and view all the answers
Which of the following best describes a 'covert' outsider attack?
Which of the following best describes a 'covert' outsider attack?
Signup and view all the answers
What is the main driver behind the increased opportunity for cybercriminals?
What is the main driver behind the increased opportunity for cybercriminals?
Signup and view all the answers
What type of security issue involves unauthorized physical access to a computer system?
What type of security issue involves unauthorized physical access to a computer system?
Signup and view all the answers
What is cited as a key trend in modern communications and business activities?
What is cited as a key trend in modern communications and business activities?
Signup and view all the answers
A computer virus falls under which classification of security threat?
A computer virus falls under which classification of security threat?
Signup and view all the answers
What is the critical element that defines a network security issue?
What is the critical element that defines a network security issue?
Signup and view all the answers
What does the term 'outsiders unintended' refer to concerning security threats?
What does the term 'outsiders unintended' refer to concerning security threats?
Signup and view all the answers
Three decades ago, how was the field of computer security viewed?
Three decades ago, how was the field of computer security viewed?
Signup and view all the answers
What is the analogy used to describe the continuous battle between cyber security experts and cybercriminals?
What is the analogy used to describe the continuous battle between cyber security experts and cybercriminals?
Signup and view all the answers
What does the text suggest regarding the possibility of 100% protection from cyber attacks?
What does the text suggest regarding the possibility of 100% protection from cyber attacks?
Signup and view all the answers
What is a primary consequence for businesses that neglect cyber security?
What is a primary consequence for businesses that neglect cyber security?
Signup and view all the answers
Why can data breaches affecting customers be more damaging than those only impacting the company?
Why can data breaches affecting customers be more damaging than those only impacting the company?
Signup and view all the answers
What legal obligation do businesses have regarding customer data in the online space?
What legal obligation do businesses have regarding customer data in the online space?
Signup and view all the answers
In the context of data security, who are classified as 'insiders'?
In the context of data security, who are classified as 'insiders'?
Signup and view all the answers
Why can employees pose a more serious threat than outsiders?
Why can employees pose a more serious threat than outsiders?
Signup and view all the answers
What is an example of 'insiders overt' security breaches?
What is an example of 'insiders overt' security breaches?
Signup and view all the answers
Which of the following is most likely to result from an 'insiders covert' action?
Which of the following is most likely to result from an 'insiders covert' action?
Signup and view all the answers
What is the most common threat class regarding internal breaches?
What is the most common threat class regarding internal breaches?
Signup and view all the answers
What is smishing primarily associated with?
What is smishing primarily associated with?
Signup and view all the answers
What characterizes black hat hackers?
What characterizes black hat hackers?
Signup and view all the answers
Which type of hacker is hired by businesses to uncover security vulnerabilities?
Which type of hacker is hired by businesses to uncover security vulnerabilities?
Signup and view all the answers
What is the main objective of computer vandalism?
What is the main objective of computer vandalism?
Signup and view all the answers
Which type of hacker might be hired before a system launch to check for potential issues?
Which type of hacker might be hired before a system launch to check for potential issues?
Signup and view all the answers
What is typically the motivation behind computer hacking?
What is typically the motivation behind computer hacking?
Signup and view all the answers
What distinguishes grey hat hackers from other types?
What distinguishes grey hat hackers from other types?
Signup and view all the answers
What can be a consequence of computer hacking?
What can be a consequence of computer hacking?
Signup and view all the answers
What is the primary intent behind the vast majority of computer viruses?
What is the primary intent behind the vast majority of computer viruses?
Signup and view all the answers
Which of the following is NOT a necessary condition for an email to be considered spam?
Which of the following is NOT a necessary condition for an email to be considered spam?
Signup and view all the answers
What is a common characteristic of items involved in online auction fraud?
What is a common characteristic of items involved in online auction fraud?
Signup and view all the answers
What typically motivates a cybercriminal to engage in cyber squatting?
What typically motivates a cybercriminal to engage in cyber squatting?
Signup and view all the answers
What happens when the conditions of a logic bomb are met?
What happens when the conditions of a logic bomb are met?
Signup and view all the answers
What is the main purpose behind web jacking?
What is the main purpose behind web jacking?
Signup and view all the answers
Which statement about spam emails is true?
Which statement about spam emails is true?
Signup and view all the answers
Why might some hackers develop advanced viruses?
Why might some hackers develop advanced viruses?
Signup and view all the answers
What is the primary goal of physical security measures for computers and network systems?
What is the primary goal of physical security measures for computers and network systems?
Signup and view all the answers
Why is user tracking important in a cyber security framework?
Why is user tracking important in a cyber security framework?
Signup and view all the answers
Which of the following can be a consequence of insufficient physical security for a facility?
Which of the following can be a consequence of insufficient physical security for a facility?
Signup and view all the answers
What component is NOT mentioned as a potential physical security measure?
What component is NOT mentioned as a potential physical security measure?
Signup and view all the answers
How can the effectiveness of a company's physical security be evaluated?
How can the effectiveness of a company's physical security be evaluated?
Signup and view all the answers
What is one risk of not tracking user activity within a system?
What is one risk of not tracking user activity within a system?
Signup and view all the answers
What potential threat should physical security measures also consider beyond unauthorized access?
What potential threat should physical security measures also consider beyond unauthorized access?
Signup and view all the answers
What is a critical element of user tracking in a cyber security context?
What is a critical element of user tracking in a cyber security context?
Signup and view all the answers
Study Notes
Unit 1: Understanding Cyber Security
- Cyber security refers to all safeguards to reduce digital security breaches, protecting privacy, confidentiality, along with data integrity and identity protection.
- Cyber security breaches are increasing in a world relying on connected technology.
- Cyber security issues are costly, impacting reputation, causing system downtime, and resulting in financial loss.
- Half of businesses in 2017 suffered attacks or attempted breaches.
- Businesses worldwide are prioritizing cyber security through robust measures and hiring experts.
Learning Outcomes
- Learners will define cyber security and its objectives.
- Learners will understand various cybercrime causes and those responsible.
- Learners will discuss cybercrime classifications and Microsoft's 10 laws of computer security.
What is Cyber Security?
- Cyber security encompasses all measures to reduce digital security breaches.
- It affects all computers and mobile devices, potentially targeted by cyber criminals.
- Key elements include privacy, confidentiality, data integrity, and identity protection.
- Cybercrime incidents are becoming more common.
The Importance of Security
- The internet has fundamentally transformed daily life for billions globally.
- Increasing internet traffic volume presents a significant opportunity for cyber criminals.
- Cyber security is no longer optional for businesses, with attacks having devastating consequences.
- Reputational damage can be challenging to overcome after an attack, even after business operations resume as normal.
- Protecting customers is crucial: a breach impacting customers can be more damaging than an attack on the company.
Insiders and Outsiders
- Cyber security classifications involve insiders (employees) and outsiders (non-employees).
- Insider threats are often classified as overt, covert, and unintended.
- Outsiders can carry out overt, covert, unintended attacks, or accidents.
- Accidents, such as natural disasters or equipment failures, represent a special class of threats that are not directly caused by humans.
The Seven Individual Classes
- Insiders overt: actions by disgruntled employees, leading to data compromise or equipment damage.
- Insiders covert: employees with privileged access causing more damage than outsiders.
- Insiders unintended: security issues caused by human error.
- Outsiders overt: direct attacks on network systems by outsiders— including denial-of-service (DoS) attacks).
- Outsiders covert: attacks involving software transmission from outside the business.
- Outsiders unintended: outsiders unintentionally harming a computer or accessing sensitive data.
- Accidents: issues regarding data integrity or security from unpredictable events—like natural disasters.
Classifications of Computer Security Issues
- Physical security: includes theft, damage, or physical access of computer equipment, systems, or data.
- Rogue software: includes viruses, malware, and other malicious software.
- Network security: comprises breaches and compromises of networks without authorization.
Microsoft’s 10 Laws of Cyber Security
- If someone persuades you to run a program, it’s no longer your computer.
- If someone alters the operating system, it’s no longer your computer.
- If someone has physical access, it’s no longer your computer.
- If someone uploads to your website, it's no longer your website.
- Weak passwords defeat strong security. (and other 5 points)
Recovery Planning
- A well-prepared disaster recovery plan outlines steps in case of facility destruction or inoperability
- Keeping hard copies of important documents alongside backups can aid recovery.
- Cybercrime refers to unlawful acts involving computers or connected devices.
- Motivations for cybercrime can include greed, revenge, or simple enjoyment.
Cyber Crimes
- Insider attacks occur from within an organisation.
- External attacks are launched from outside.
Structured & Unstructured Attacks
- Unstructured attacks are performed by individuals with limited experience or motivation, often randomly.
- Structured attacks are planned by skilled perpetrators, aiming to exploit vulnerabilities or gain access strategically.
Motivations for Cyber Crime
- Monetary gain
- Revenge
- Terrorism
- Recognition
- Anonymity
- Espionage
The Different Kinds of Cyber Crime
- Cyber stalking occurs through harassment or threats on social media.
- Child pornography involves possession and distribution of inappropriate content.
- Forgery/Counterfeiting involves creating fake documents.
- Software piracy violations copyright on software.
- Cyber terrorism aims to coerce or intimidate in pursuing a cause or political goal
Phishing
- Phishing involves tricking parties to reveal personal info by imitating trustworthy sources (often via email)
- Computer vandalism is damaging or destroying computer systems or data.
- Computer hacking encompasses unauthorized access of computer systems by malicious intent.
- White hat hacking is ethical and used for finding vulnerabilities.
- Black hat hacking aims at criminal activities.
- Grey hat hacking involves finding vulnerabilities, then offering services for remediation.
Other Cybercrimes
- Internet time theft: hacking to use an individual's internet account.
- Denial of Service (DoS) attacks: flooding a website to stop it functioning.
- Email Spoofing: fraudulently making email header look like they came from a different source.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz focuses on the fundamentals of cyber security, emphasizing its importance in today's digital landscape. Learners will explore definitions, objectives, and classifications of cyber crimes, as well as the implications of security breaches on businesses. Gain insights into the measures that organizations can take to protect their information.