0% found this document useful (0 votes)
843 views17 pages

Cybersecurity Fundamentals Guide

This document provides an overview of key concepts in information assurance and security including definitions of terms like cybersecurity, information security, data integrity, availability, confidentiality, authentication, and non-repudiation. It also summarizes the main steps in common cyber attack models like reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. Additionally, it identifies basic steps for securely storing personal data like using strong, unique passwords and minimizing data stored online.

Uploaded by

Dina Schaub
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
843 views17 pages

Cybersecurity Fundamentals Guide

This document provides an overview of key concepts in information assurance and security including definitions of terms like cybersecurity, information security, data integrity, availability, confidentiality, authentication, and non-repudiation. It also summarizes the main steps in common cyber attack models like reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. Additionally, it identifies basic steps for securely storing personal data like using strong, unique passwords and minimizing data stored online.

Uploaded by

Dina Schaub
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

UGRD-IT6205A [INFORMATION ASSURANCE AND SECURITY 1]

Cyber security, also referred to as information technology security, focuses on


protecting computers, networks, programs and data from unintended or
unauthorized access, change or destruction.
- True

Is the process of maintaining an acceptable level of perceived risk


- Security

Is a process, not an end state


- Security

Cyberspace is "the environment in which communication over computer networks


occurs.“
- True

Type of Concept for Cybercrime


- Digital Underground, Underground Economy, Phishing,
Hacktivism, Cyberwar:Estonia Case and Stuxnet

Six Concept of CyberCrime


- Digital Underground, Underground Economy, Phishing,
Hacktivism, Cyberwar:Estonia Case and Stuxnet

Is roughly equivalent to privacy


- Confidentiality

Assurance that the information is authentic and complete.


- Availability

Assurance that information is shared only among authorized persons or


organizations.
- Confidentiality

Cybersecurity is the collection of tools, policies, security concepts, security


safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance and technologies that can be used to protect the cyber
environment and organization and user’s assets.
- True

Availability: Availability of information refers to ensuring that authorized parties are


able to access the information when needed
- True

In information security, data integrity means maintaining and assuring the accuracy
and consistency of data over its entire life-cycle.
- True

Three Features of Security


- Confidentiality, Integrity and Availability

Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer
and a network. The computer may have been used in the commission of a crime, or
it may be the target.
- True

Availability:Assurance that the systems responsible for delivering, storing and


processing information are accessible when needed, by those who need them.
- True

Timely, reliable access to data and information  services for authorized users;
- Availability

Protection against unauthorized modification or  destruction of information


- Integrity

Raw facts with a known coding system


- Data

Processed data
- Information
Actions taken that protect and defend information and  information systems by
ensuring their availability,  integrity, authentication, confidentiality and non-
repudiation
- True

Information Assurance (IA) is the study of how to protect your  information assets


from destruction, degradation, manipulation and  exploitation.
- True

Information and data manipulation abilities in cyberspace;


- Information Infrastructure

Accepted facts, principles, or rules of thumb that are  useful  for specific domains.
- Knowledge

Four Security Domains


- Physical Security, Personnel Security, IT Security and
Operational Security

Raw facts with an unknown coding system


- Noise

It should be:  accurate, timely, complete, verifiable, consistent,  available.


- Knowledge

Assurance that information is not disclosed to  unauthorized persons


- Confidentiality

Data and data processing activities in physical space;


- Physical

Security measures to establish the validity of a  transmission, message, or originator.


- Authentication

Converting data into  information thus  requires knowledge


- Information

Assurance that the sender is provided with proof  of a data delivery and recipient is
provided with proof  of the sender’s identity, so that neither can later deny  having
processed the data.
- Non-repudiation

Is data  endowed with relevance  and purpose.


- Information

Consists of employees, former employees and  contractors.


- Insiders

Information security technical measures  such as:        encryption and key


management, intrusion  detection, anti-virus software, auditing, redundancy, 
firewalls, policies and standards.
- Defender’s operations

To affect the technical performance and the  capability of physical systems, to


disrupt the  capabilities of the defender.
- Desired Effects

Involves the implementation of standard  operational security procedures that define


the nature and  frequency of the interaction between users, systems, and system 
resources, the purpose of which is to.
- Operational Security

Physical attack and destruction, including:  electromagnetic attack, visual spying,


intrusion,  scavenging and removal, wiretapping, interference,  and eavesdropping.
- Attacker’s Operations

Is the study of how to protect your  information assets from destruction,


degradation, manipulation and  exploitation.
- Information Assurance
Refers to the protection of hardware, software,  and data against physical threats to
reduce or prevent disruptions  to operations and services and loss of assets.”
- Physical Security

Three distinct levels:


- Desired Effects, Physical, Perceptual

Is the inherent technical features and functions that  collectively contribute to an IT


infrastructure achieving and  sustaining confidentiality, integrity, availability,
accountability, authenticity, and reliability.”
- IT Security

Is a variety of ongoing measures taken to  reduce the likelihood and severity of
accidental and intentional  alteration, destruction, misappropriation, misuse,
misconfiguration,  unauthorized distribution, and unavailability of an organization’s 
logical and physical assets, as the result of action or inaction by  insiders and known
outsiders, such as business partners.”
- Personnel Security

Risk Management Procedure consists of six steps.


- Assess vulnerabilities, Assess risks, Assess threats, Assess
assets, Make risk management decisions, Prioritize
countermeasure options

Seven Stages of lifecycle model


- Requirements, Design, Coding, Testing, Deployment,
Production and Decommission

Not performing an activity that would incur risk.


- Risk Avoidance

Are the security features of a system that  provide enforcement of a security policy.
- Trust mechanism

Risks not avoided or transferred are retained by  the organization.


- Risk Acceptance
Is a generic term that implies a mechanism in place to  provide a basis for
confidence in the reliability/security of the  system.
- Trust

Shift the risk to someone else.


- Risk Transfer

Acceptance, avoidance, mitigation,  transfer—are with respect to a specific risk for a


specific pary.
- The risk treatment

Taking actions to reduce the losses due to a risk;  many technical countermeasures
fall into this  category.
- Risk mitigation

The main ways of transport are e-mails (attachment of infected files), web platforms
(running malware scripts), or removable USB memories;
- Delivery

Transmitting the weapon to the target environment.


- Delivery

These actions typically consist of collecting information, modifying data integrity, or


attacking the availability of services and devices, but the victim system can also be
used as a starting point for infecting other systems or for expanding access to the
local network.
- Action on objective

Making a malware application (for example, a computer trojan) that, combined with
an exploitable security breach, allows remote access. Moreover, PDF (Portable
Document Format) files or Microsoft Office suite-specific files can be regarded as
weapons available to the attacker;
- Weaponization
Research, target identification and selection: it may be looking for e-mail addresses,
social relationships, or data about a particular technology, information displayed on
various websites;
- Reconnaissance

The infected file can be used by the self-execution facility to launch the malware
code, or it can be executed by the user himself;
- Exploitation

Logical security consists in software that are necessary to control the access to


information and services of a system. The logical level is divided into two categories:
access security level and service security level.
- Prevent Cyber-Attacks

Infecting a victim system with a computer trojan, backdoor or other malware


application of this type that ensures the attacker’s presence in the target
environment;
- Installation

What are the steps in intrusion model?


- Recon, Weaponise, Deliver, Exploit, Install, C2 and Action

Physical security consist in the closure of IT equipment in a dedicated space and the


provision of access control.
- Prevent Cyber-Attacks

Usually an infected host must be accessible outside of the local network to establish
a command and control channel between the victim and the attacker. Once this
bidirectional communication has been made, an attacker has access inside the target
environment and can usually control the activity by manually launching commands;
- Command and Control
After the weapon is delivered to the victim, follows the targeting of an application or
vulnerability of the operating system. The infected file can be used by the self-
execution facility to launch the malware code, or it can be executed by the user
himself;
- Exploitation

Once this bidirectional communication has been made, an attacker has access inside
the target environment and can usually control the activity by manually launching
commands;
- Command and Control

After the first six phases, an attacker can act to achieve the goals. These actions
typically consist of collecting information, modifying data integrity, or attacking the
availability of services and devices, but the victim system can also be used as a
starting point for infecting other systems or for expanding access to the local
network.
- Action on Objective

Is it true or false. The use of complex, unique, hard to guess or break passwords,
consisting of numbers, upper/lower case letters and special characters is some basic
steps in storing personal data.
- True

Is it true or false. Storage the minimum required data online and maximum


discretion in providing them to a third party (users, companies) is some basic steps
in storing personal data.
- True

Is it true or false. Using encrypted versions of protocols when sensitive information is


exchanged so as to ensure data confidentiality and prevent identity theft is some
basic steps in storing personal data.
- True

Acronym for TCB?


- Trusted Computing Base
Is the process by which an asset is managed from its  arrival or creation to its
termination or destruction.
- Lifecycle

Is it true or false. An additional risk occurs when personal information is stored in


client accounts on commercial websites, which may become the target of cyber-
attacks anytime, so stored data becomes vulnerable is some basic steps in storing
personal data.
- True

Is a collection of all the trust  mechanisms of a computer system which collectively


enforce the  policy.
- TCB

Is a measure of confidence that the security features,  practices, procedures, and


architecture of a system accurately  mediates and enforces the security policy.
- Assurance

Failure of the mechanism may destroy the basis for trust.


- Trust

Is it true or false. Encrypting all personal information when saved on different


storage media is some basic steps in storing personal data.
- True

True or False: Identify extended enterprise (units) - those units outside the scoped
enterprise who will need to enhance their security architecture for interoperability
purposes
- True

This assured that the information is authentic and complete.


- integrity

Those who are most affected and achieve most value from the security work
- Identify core enterprise
Establish architecture artifact, design, and code reviews and define acceptance
criteria for the successful implementation of the findings. What phase is that?
- Phase G: Implementation Governance

Following a cyber risk assessment, develop and implement a plan to mitigate cyber
risk and protect the “_____________” outlined in the assessment.
- crown jewels

IA takes steps to maintain integrity, such as having anti-virus software in place so


that data will not be altered or destroyed, and having policies in place.
- True

This is an assurance that the systems responsible for delivering, storing, and
processing information are accessible when needed, by those who need them.
- availability

The ability to provide forensic data attesting that the systems have been used in
accordance with stated security policies.
- Audit

This is not a type of application security.


- photo enhancement

In a phased implementation the new security components are usually part of the
infrastructure in which the new system is implemented. The security infrastructure
needs to be in a first or early phase to properly support the project. What phase is
that?
- Phase F: Migration Planning

Definition of relevant stakeholders and discovery of their concerns and objectives


will require development of a high-level scenario. What phase is that?
- Phase A: Architecture Vision
From the Baseline Security Architecture and the Enterprise Continuum, there will be
existing security infrastructure and security building blocks that can be applied to
the requirements derived from this architecture development engagement. What
phase is that?
- Phase E: Opportunities & Solutions

Protecting the authentication can involve protecting against malicious code, hackers,


and any other threat that could block access to the information system.
- False

Cyber security, also referred to as____________________, focuses on protecting


computers, networks, programs and data from unintended or unauthorized access,
change or destruction.
- information technology security

Many security vulnerabilities originate as design or code errors and the simplest and
least expensive method to locate and find such errors is generally an early review by
experienced peers in the craft. What phase is that?
- Phase G: Implementation Governance

The following security specifics appropriate to the security architecture must be


addressed within each phase in addition to the generic phase activities. What phase
is that?
- Phase A: Architecture Vision

In IA, this automatically happened as well as availability and reliable and timely
access to information.
- confidentiality

Combining sound cyber security measures with an educated and security-minded


employee base provides the best defense against ________________attempting to gain
access to your company’s sensitive data.
- cyber criminals

Security architecture has its own discrete security methodology.


- True
These are all common examples of network security implementation except one.
- clean storage feature

This issued guidelines in its risk assessment framework that recommend a shift


toward continuous monitoring and real-time assessment.
- National Institute of Standards and Technology

True or False: Identify the security governance involved, including legal frameworks


and geographies (enterprises)
- True

Every system will rely upon resources that may be depleted in cases that may or may
not be anticipated at the point of system design. What phase is that?
- Phase D: Technology Architecture

The definition and enforcement of permitted capabilities for a person or entity


whose identity has been established.
- Authentication

The substantiation of the identity of a person or entity related to the enterprise or


system in some way.
- Authentication

This is "the environment in which communication over computer networks occurs.“


- cyberspace

_______________ should also consider any regulations that impact the way the
company collects, stores, and secures data, such as PCI-DSS, HIPAA, SOX, FISMA.
- Cyber Risk Assessment

Security architecture introduces its own normative flows through systems and
among applications.
- True

Assess and baseline current security-specific technologies


- Phase D: Technology Architecture
The organizations and the government have focused most of their cyber security
resources on perimeter security to protect all the encrypted system components.
- False

This consists of the cyber-physical systems that modern societies rely on.
- critical infrastructure security

Changes in security requirements are often more disruptive than a simplification or


incremental change. Changes in security policy can be driven by statute, regulation,
or something that has gone wrong. What phase is that?
- Phase H: Architecture Change Management

True or False: Identify communities involved (enterprises) - those stakeholders who


will be affected by security capabilities and who are in groups of communities
- True

Concept Cybercrime
- Digital Underground, Underground Economy,Phishing,
Hacktivism, Cyberwar:Estonia Case and Stuxnet

True or False: Risk analysis documentation


- True

These are constantly creating and implementing new security tools to help
enterprise users better secure their data.
- cloud providers

This involves ensuring that the users are who they say are and one of the most
famous method to secure this is by using password.
- authentication

Assess the impact of new security measures upon other new components or existing
leveraged systems. What phase is that?
- Phase F: Migration Planning

The organization's attitude and tolerance for risk.


- Risk Management

IA is a special subject under Information Technology program.


- False

Failure to protect sensitive information can result in __________ issued by regulatory


agencies or lawsuits from other companies or individuals.
- fines

Determine who are the legitimate actors who will interact with the
product/service/process. What phase is that?
- Phase B: Business Architecture

All are benefits of information protection except one.


- e-mailing the suppliers and partners with updated services

Identify existing security services available for re-use

- Phase E: Opportunities & Solutions

Those units outside the scoped enterprise who will need to enhance their security
architecture for interoperability purposes
- Identify extended enterprise

The ability of the enterprise to function without service interruption or depletion


despite abnormal or malicious events.
- Availability

Security architecture calls for its own unique set of skills and competencies of the
enterprise and IT architects.
- True

Changes in security standards are usually less disruptive since the trade-off for their
adoption is based on the value of the change.
- Phase H: Architecture Change Management

True or False: Codified data/information asset ownership and custody


- True

Are applicable to ensuring that security requirements are addressed in subsequent


phases of the ADM. What phase is that?
- Phase A: Architecture Vision

A full inventory of architecture elements that implement security services must be


compiled in preparation for a gap analysis. What phase is that?
- Phase C: Information System Architecture

This advises that companies must be prepared to “respond to the inevitable cyber
incident, restore normal operations, and ensure that company assets and the
company’s reputation are protected.”
- NCSA

The protection of information assets from loss or unintended disclosure, and


resources from unauthorized and unintended use.
- Asset Protection

Assess and baseline current security-specific technologies. What phase is that?


- Phase D: Technology Architecture

This means that only those authorized to view information are allowed access to it.
- confidentiality

Assess and baseline current security-specific architecture elements. What phase is


that?
- Phase C: Information System Architecture

True or False: Identify soft enterprise (units) - those who will see change to their
capability and work with core units but are otherwise not directly affected
- True

The state of being protected against the criminal or unauthorized use of electronic
data, or the measures taken to achieve this.
- cyber security
Information Assurance refers to the steps involved in protecting information systems
- like reproducing three copies of uploaded articles and journals.
- False

Integrity is the most important character trait of Information Assurance.


- True

Which one is not a security threat in the IT world?


- cyber bullying

The ability to add and change security policies, add or change how policies are
implemented in the enterprise, and add or change the persons or entities related to
the systems.
- Administration

Security architecture addresses non-normative flows through systems and among


applications.
- True

Those who will see change to their capability and work with core units but are
otherwise not directly affected
- Identify soft enterprise

The ability to test and prove that the enterprise architecture has the security
attributes required to uphold the stated security policies.
- Assurance

Security architecture composes its own discrete views and viewpoints.


- True

Security architecture introduces unique, single-purpose components in the design.


- True

Those stakeholders who will be affected by security capabilities and who are in
groups of communities
- Identify communities involved
Revisit assumptions regarding interconnecting systems beyond project control, Identify and evaluate
applicable recognized guidelines and standards and Identify methods to regulate consumption of
resources. What phase is that?

- Phase D: Technology Architecture

Development of the business scenarios and subsequent high-level use-cases of the


project concerned will bring to attention the people actors and system actors
involved. What phase is that?
- Phase B: Business Architecture

True or False: Business rules regarding handling of data/information assets


- True

True or False: Data classification policy documentation


- True

True or False:  Identify core enterprise (units) - those who are most affected and
achieve most value from the security work
- True

Changes in security standards are usually less disruptive since the trade-off for their
adoption is based on the value of the change. However, standards changes can also
be mandated. What phase is that?
- Phase H: Architecture Change Mana

True or False: Written and published security policy


- True

You might also like