CNET 1105 - Chapter 1 Quiz
15 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of information can uniquely identify an individual?

  • Personal messages and pictures exchanged online
  • Medical Records
  • Name, social security number, date and place of birth (correct)
  • Educational background and financial information
  • What is NOT typically included in an Electronic Health Record (EHR)?

  • Counseling records from childhood
  • Employment history and education records (correct)
  • Medical history and prescriptions
  • Family medical history and personal information
  • Where might your medical records be stored in addition to the doctor's office?

  • On public servers
  • With the store loyalty program
  • At your home
  • At the insurance company (correct)
  • Why do hackers target computing devices?

    <p>To gather information about the user</p> Signup and view all the answers

    What is the primary motivation of black hat attackers?

    <p>To gain personal or financial benefits illegally</p> Signup and view all the answers

    What is the term for amateur attackers who use existing tools or instructions found online?

    <p>Script Kiddies</p> Signup and view all the answers

    What is the primary focus of organized hackers such as cyber criminals?

    <p>Gaining control, power, and wealth</p> Signup and view all the answers

    Why do internal security threats have the potential to cause greater damage than external threats?

    <p>Internal users have direct access to the building and infrastructure devices</p> Signup and view all the answers

    What is a common way internal users can accidentally introduce malware into the network?

    <p>Through malicious email attachments</p> Signup and view all the answers

    What is a characteristic of internal security threats?

    <p>They have direct access to the building and its infrastructure devices</p> Signup and view all the answers

    What is the primary goal of a cyberwarfare attack?

    <p>To disrupt or damage critical infrastructure</p> Signup and view all the answers

    What is unique about the Stuxnet malware?

    <p>It was designed to damage physical equipment controlled by computers</p> Signup and view all the answers

    What is the term for the type of conflict that involves the penetration of computer systems and networks of other nations?

    <p>Cyberwarfare</p> Signup and view all the answers

    What is the primary purpose of confidentiality in the CIA triad?

    <p>To restrict access to data for authorized personnel</p> Signup and view all the answers

    What is the primary purpose of integrity in the CIA triad?

    <p>To ensure data is accurate and trustworthy</p> Signup and view all the answers

    Study Notes

    Personal Data

    • Personal data is any information that can uniquely identify an individual.
    • This data includes online exchanges, such as pictures and messages, as well as personal information like name, social security number, date and place of birth, and mother's maiden name.

    Medical Records

    • Electronic health records (EHRs) contain personal information, medical history, and other health-related data.
    • EHRs may include information about family members, medical devices, and non-medically related personal information.
    • Medical devices, such as fitness bands, can generate and store clinical data, including heart rates, blood pressures, and blood sugars.

    Education Records

    • Education records contain information about grades, test scores, attendance, courses taken, and awards and degrees received.
    • These records may also include contact information, health and immunization records, and special education records, including individualized education programs (IEPs).

    Employment and Financial Records

    • Financial records include information about income, expenditures, and tax records.
    • Tax records may include paycheck stubs, credit card statements, credit ratings, and other banking information.
    • Employment information can include past employment and performance evaluations.

    Personal Data

    • Personal data is any information that can uniquely identify an individual.
    • This data includes online exchanges, such as pictures and messages, as well as personal information like name, social security number, date and place of birth, and mother's maiden name.

    Medical Records

    • Electronic health records (EHRs) contain personal information, medical history, and other health-related data.
    • EHRs may include information about family members, medical devices, and non-medically related personal information.
    • Medical devices, such as fitness bands, can generate and store clinical data, including heart rates, blood pressures, and blood sugars.

    Education Records

    • Education records contain information about grades, test scores, attendance, courses taken, and awards and degrees received.
    • These records may also include contact information, health and immunization records, and special education records, including individualized education programs (IEPs).

    Employment and Financial Records

    • Financial records include information about income, expenditures, and tax records.
    • Tax records may include paycheck stubs, credit card statements, credit ratings, and other banking information.
    • Employment information can include past employment and performance evaluations.

    Data Privacy Concerns

    • Medical records can be shared with insurance companies for billing and quality control, which means a part of your medical record is in the insurance company's possession.
    • Store loyalty cards can compile a profile of your purchases, which is used to target you with special offers from marketing partners.

    Online Data Sharing Risks

    • When sharing pictures online, copies of those pictures can be saved on:
      • Your own devices
      • Your friends' devices (if they download or save the pictures)
      • Strangers' devices (if the pictures are shared publicly)
      • Servers located in different parts of the world (where the pictures are saved)

    Data Distribution

    • Pictures shared online can be:
      • Downloaded by others
      • Taken as screenshots by others
      • Saved on servers worldwide

    Computing Devices and Personal Data

    • Computing devices have become portals to access personal data, not just storage devices.
    • They generate information about users through online activities.

    Accessing Personal Data

    • Most people access their account statements digitally, rather than receiving paper statements.
    • Computing devices are used to access credit card statements through the issuer's website.
    • Users access their bank's website to pay credit card bills online.

    Personal Data and Cybersecurity

    • With personal data accessible online, it has become a valuable target for hackers.
    • Hackers can profit from compromised personal data.

    Types of Attackers

    • Attackers are individuals or groups that attempt to exploit vulnerabilities for personal or financial gain.
    • Attackers are interested in anything with value, including credit cards, product designs, and more.

    Amateurs (Script Kiddies)

    • Characterized by little or no skill, often using existing tools or instructions found on the Internet to launch attacks.
    • May be curious, trying to demonstrate their skills, or attempting to cause harm.
    • Can still cause devastating results despite using basic tools.

    Hackers

    • Break into computers or networks to gain access.
    • Classified as white, gray, or black hats based on their intent.

    White Hat Hackers

    • Break into networks or computer systems to discover weaknesses and improve security.
    • Break-ins are done with prior permission, and results are reported back to the owner.

    Black Hat Hackers

    • Take advantage of vulnerabilities for illegal personal, financial, or political gain.

    Gray Hat Hackers

    • Somewhere between white and black hat hackers.
    • May find vulnerabilities and report them to the system owners if it aligns with their agenda.
    • May publish vulnerability information online, allowing other attackers to exploit it.

    Organized Hackers

    • Include organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers.

    Cyber Criminals

    • Groups of professional criminals focused on control, power, and wealth.
    • Highly sophisticated and organized, may provide cybercrime as a service to other criminals.

    Hacktivists

    • Make political statements and create awareness about issues important to them.

    State-Sponsored Hackers

    • Gather intelligence or commit sabotage on behalf of their government.
    • Highly trained and well-funded, with focused attacks on specific goals that benefit their government.

    Internal Security Threats

    • Internal users, such as employees or contract partners, can pose a threat to organizational security through:
      • Mishandling confidential data
      • Threatening internal server or network infrastructure operations
      • Facilitating outside attacks through infected USB media
      • Accidentally introducing malware through malicious email or websites
    • Internal threats can cause greater damage due to internal users' direct access to the building and its infrastructure devices
    • Internal users have knowledge of the corporate network, its resources, and confidential data, as well as varying levels of user or administrative privileges

    External Security Threats

    • External threats can come from amateur or skilled attackers who exploit vulnerabilities in:
      • Network devices
      • Computing devices
    • External threats can also use social engineering to gain unauthorized access

    Cyberspace and Modern Warfare

    • Cyberspace has become a new dimension of warfare, enabling countries to engage in conflicts without traditional troops and machines.
    • This level playing field allows countries with minimal military presence to be as strong as other nations in cyberspace.

    Cyberwarfare

    • Cyberwarfare refers to Internet-based conflicts involving the penetration of computer systems and networks of other nations.
    • Attackers use their resources and expertise to launch massive Internet-based attacks against other nations, causing damage or disrupting services.
    • Examples of such attacks include shutting down a power grid.

    Stuxnet Malware Attack

    • The Stuxnet malware was a state-sponsored attack designed to damage Iran's nuclear enrichment plant.
    • Unlike typical malware, Stuxnet did not aim to steal information; instead, it was designed to damage physical equipment controlled by computers.
    • The malware used modular coding, which allowed it to perform specific tasks, and stolen digital certificates to appear legitimate to the system.

    CIA Triad

    • The CIA triad consists of confidentiality, integrity, and availability, guiding principles for information security in organizations.

    Confidentiality

    • Ensures privacy of data by restricting access through authentication and encryption.
    • Restricts access to authorized personnel and ensures only authorized individuals can view sensitive data.
    • Data is compartmentalized according to security or sensitivity level.
    • Methods to ensure confidentiality include data encryption, username ID and password, two-factor authentication, and minimizing exposure of sensitive information.

    Integrity

    • Ensures accuracy, consistency, and trustworthiness of data throughout its life cycle.
    • Data must be unaltered during transit and not changed by unauthorized entities.
    • Methods to ensure integrity include file permissions, user access control, version control, backups, and checksum hashing.
    • Checksums are used to verify the integrity of files or strings of characters after transfer.
    • Hash functions transform data into a fixed-length value that represents the data.

    Availability

    • Ensures that information is accessible to authorized people.
    • Maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups ensure availability.
    • Plans should be in place to recover quickly from natural or man-made disasters.
    • Security equipment or software, such as firewalls, guard against downtime due to attacks like denial of service (DoS).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Quiz about personal information that can uniquely identify an individual online, including pictures, messages, and sensitive data.

    More Like This

    NIN Tokenization Overview
    12 questions
    Personal Data and Privacy
    24 questions

    Personal Data and Privacy

    ObtainableWatermelonTourmaline4962 avatar
    ObtainableWatermelonTourmaline4962
    Use Quizgecko on...
    Browser
    Browser