LO1

    Cards (51)

    • What are the 3 ways to quality of protect information
      • Integrity
      • availability
      • Confidentiality
    • What might a company want to keep secure?
      Personal detail of customers/employees
      Financial information
      Assets like hardware or software
      Intellectual Property
    • What is confidentiality?
      Information that should be only accessible by individuals or groups with the authorisation to do so
    • What logical method can help improve the confidentiality of information?
      CRUD permissions on files and folders
    • Define Integrity
      Information is maintained so that it is up-to-date, correct, accurate and fit for purpose. Therefore it can be trustworthy
    • What is the issue if individuals dont have integrity when an appointment has changed?
      Less organised
      May miss opportunities
      More forgetful
    • What is the impact on Goverments if data doesnt have integrity?

      Disagreements within the country
      Sensitive/confidential information may be released or stolen
    • What are 2 ways of improving data integrity?
      Proof reading
      MFA / 2FA
    • Define Availability
      Information that is available to the individual or group that require it. It should be accessible 24/7 and up-to-date at the time that the user wants to access it
    • What type of attack did a criminal group use against Synnovis?
      Ransomware
    • What does unauthorized access refer to?
      Gaining access to systems without permission
    • What was the impact of the ransomware attack on Synnovis?
      They had to delay procedures and operations for patients
    • How is hacking defined in the context of unauthorized access?
      Gaining access through means other than legitimate credentials
    • What is vertical escalation of privileges?
      Accessing parts of a system beyond normal access levels
    • What is horizontal escalation of privileges?
      Accessing other users' normal areas
    • What is information disclosure?
      When someone with knowledge shares information with unauthorized individuals
    • What are two types of information that can be disclosed?
      Personal information and government information
    • What is modification of data?
      Amending, changing, or deleting data by authorized individuals
    • What is accidental modification of data?
      When security levels are weak and someone alters information unintentionally
    • What is malicious intent modification of data?
      Illegally modifying data to blackmail or disrupt
    • What does inaccessible data refer to?
      Data that users cannot access despite having permissions
    • What is ransomware?
      An attack that makes data inaccessible
    • What is a denial of service attack?
      Overloading a website to make it inaccessible
    • What is destruction of data?
      Intentional destruction of data using malware
    • What are two methods of data theft?
      Identity theft and financial theft
    • How can cyber incidents occur?
      Through unauthorized access, information disclosure, modification, inaccessible data, and destruction
    • What is social engineering in the context of cyber incidents?
      Manipulating individuals to gain confidential information
    • What is an example of unauthorized access?
      Guessing someone's password
    • What is phishing?
      A method to gain credentials by tricking users
    • What is privileged account abuse?
      Using credentials to lock a user out of their own account
    • What is pretexting?
      Posing as an IT administrator to gain login details
    • What are the main types of cyber incidents and their methods?
      • Unauthorized access: Guessing passwords, exploiting vulnerabilities
      • Information disclosure: Malware, blackmail, industrial espionage
      • Modification: Human error, phishing
      • Inaccessible data: Ransomware attacks
      • Destruction: Malware, physical destruction, industrial espionage
    • What are the consequences of data theft?
      • Loss of access to original data
      • Potential misuse of stolen information
      • Financial loss and identity theft
    • What are the methods of data destruction?
      • Using malware
      • Deliberate erasure
      • Physical destruction of servers
    • What are the types of escalation of privileges?
      • Vertical escalation: Accessing higher-level permissions
      • Horizontal escalation: Accessing other users' areas
    • What are the types of modification of data?
      • Accidental modification due to weak security
      • Malicious intent modification for blackmail or disruption
    • What are the types of information that can be disclosed?
      • Personal information
      • Government information
    • What are the consequences of unauthorized access?
      • Data breaches
      • Loss of sensitive information
      • Disruption of services
    • What are the impacts of ransomware on organizations?
      • Delays in operations
      • Financial losses
      • Compromised patient or client data
    • Why is it important to protect personal data?
      To prevent identity theft and misuse of information.
    See similar decks