Module 5 Chp 5 Cybersecurity
Which of the following statements refer to programs known as spiders, web crawlers, and bots?
- "Good bots" have diverse functions and do not pose security risks. - Internet robots are used for both legitimate and malicious purposes. - Malicious bots create security risks by compromising a user's control of the computer.
internal threats to cybersecurity
- An attack by an authorized user - The leakage of sensitive information - An accidental erasure of data
What confidential information does Social Engineering target?
- Bank Information - Passwords - Access to computers or networks - Social Security Numbers
How does cybersecurity help preserve the integrity of data, information, and systems?
- Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. - Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity. - Cybersecurity threat mitigation includes measures to protect the consistency, accuracy, and dependability of these assets.
How does cybersecurity help preserve the integrity of data, information, and systems?
- Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. - Cybersecurity threat mitigation includes measures to protect the consistency, accuracy, and dependability of these assets. - Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity.
Assets affected by cybersecurity threat
- Information - Software - Hardware
For a cybersecurity plan to succeed, which of the following must remain confidential?
- The organization's digital or computer systems - The logins and passwords of authorized users - Private or sensitive data and information
What are the 3 Main Components of Threat Mitigation?
- Threat Prevention - Threat Identification - Threat Cure
What are the 4 Common Types of Cybersecurity Breaches?
- Viruses - Spyware - Impersonation - Distributed Denial of Service (DDOS) Attack
The purpose of spyware is to ______
- capture the user's account data - passwords - key strokes - Other confidential information
Distributed Denial of Service (DDoS)
A cyberattack to make a computer or online service unavailable to its users. It's usually accomplished by flooding the resource with nonsensical or superfluous requests from multiple sources across the web.
Impersonation
A social engineering tool in which a hacker plays the role of someone the target knows or would likely trust, thereby fooling them into sharing important information.
Cybersecurity Exploit
A tool or technique for taking advantage of a cybersecurity vulnerability to break into a system and cause harm.
Types of Asset Loss
All forms of - intentional - unintentional - accidental - incidental - misuse - abuse - error - weakness - defect - fault - failure events
Database of Software Vulnerabilities
Attackers try to find vulnerabilities to exploit the issue to launch an attack. Because of this, many organizations maintain databases of software vulnerabilities (based on the software version) that are accessible to the public and help other organizations prevent against known vulnerabilities.
Threat Prevention
Policies and procedures put in place by an organization to protect systems and data
Threat Cure
Policies, tools, and strategies used to lessen the impact of active security threats
Threat Identification
Security tools and oversight designed to identify specific and active security threats
Spyware
Software that collects information about a person's Internet surfing habits and behaviors.
Cybersecurity Threat
an event or condition that has the potential for causing asset loss and the undesirable consequences or impact from such loss
Social Engineering Attacks
designed to get the individual to divulge sensitive information that can lead to security and data breaches
Cybersecurity breaches
early-stage intrusions that can lead to system damage, data loss, and network downtime.
Viruses
software that infects computers and is created using computer code
The need to keep sensitive data, information, and systems confidential _____
is both a major goal and a requirement for cybersecurity
Causes of Asset Loss
situations and events related to adversity related to adversity typically referred to as disruptions, hazards, or threats
Spyware
software that collects information about your Internet surfing habits and behaviors
Adware
software that collects the user's web browsing history.
Cybersecurity Threat Mitigation
the policies and procedures to help prevent against security incidents
Social Engineering
the unlawful manipulation of people in order to obtain and misuse their personal information
Cybersecurity Vulnerabilities
weaknesses or flaws in system security procedures, design, implementation, and control that could be compromised accidentally or intentionally
The information collected by spyware includes:
• keystrokes • passwords • account numbers • other confidential information
System Compromises can result:
• security breaches • lost information or data • system outages • violations of an organization's system security policy • vulnerabilities also occur as a result of security exposure in an operating system or application software