10 Markers

Cards (26)

  • Evaluate the likely impact on your family member if they clicked on a link in a phishing email?
    • Identity theft
    • Financial loss
    • Changing of password to lock out of bank accounts
    • If master password was used the attacker can gain other accounts
    • Find Location of memeber
  • Discuss why a company needs to understand the techniques used by attackers who accessed customers information

    • To know what part in the system was accessed by the attacker to identify which data was accessed so customer can be notified
    • To determine where responsibilities lie within the company
    • Determine if laws have been broken
    • Profiling the attacker so that if a similar attacker tried, they will be prepared and secure
  • Evaluate the preventative measures you could take when connecting your tablet or laptop to an unsecure Wi-Fi hotspot
    • Install a VPN to provide a more secure link
    • Ensure Firewall works
    • https websites not http
    • don't enter bank details or make transactions connected to the Wi-Fi
    • Look for password locked Wi-Fi
    • Ensure personal password is strong and hard to guess
  • Evaluate the benefits to a company of using monitoring and control systems for cyber security
    • The cost of the system must match the usefulness of it
    • Monitoring systems only show events after the've happened
    • Allows you to determine what happened and prevent it from happening in the future
    • control systems restrict access to data
    • Cryptography takes time to decrypt if needed straight away but it is useful to have to defend against attackers
  • Discuss the use of monitoring as a method of reducing the likelihood of being hacked
    • Firewall and NIDS can detect traffic from a hacker
    • Able to see if employees are following policies and procedures
    • can allow re training to occur based on what they employees are actually doing wrong
    • Bad behaviour can be seen, such as leaving the account logged on which can lead to hacking.
  • Justify the use of testing for potential vulnerabilities as a method of mitigating
    • explain what methods the hacker is using to patch the vulnerabilities
    • Research how the network was set up to get more information about it
    • even if no vulnerabilities are detected, it mitigates risks as it removes possible attacks
  • Analyse the possible impacts of a cyber security incident on a company
    • Loss of customer data leads to breaching the DPA
    • Loss of Intellectual property so no longer at an advantage over competitors
    • Enables policies and procedures to be tested and for all members of staff to understand their responsibilities
    • Loss of customer confidence so they may move to a better company
  • How can a company identify areas at risk from cyber security incidents?
    By employing various assessment methods
  • What is one method to identify weak points in a system?
    Employ an ethical hacker or external company
  • How can social engineering be used to assess security?
    By pretending to be a customer to obtain information
  • What role does a third-party consultant play in security assessment?
    They examine policies and check implementation
  • What is a method to check for adherence to security policies?
    Consultants can go undercover to observe
  • What is a physical review in the context of cyber security?
    Assessing physical vulnerabilities on-site
  • Why is monitoring logs and firewalls important?
    To detect suspicious activity in real-time
  • How do ethical hackers contribute to cyber security?
    They identify vulnerabilities before malicious hackers do
  • What is the purpose of employing a social engineering company?
    To simulate customer interactions for security testing
  • What can be achieved through a physical review of a company?
    Identification of physical security vulnerabilities
  • What should be monitored to identify cyber threats?
    Logs and firewalls
  • How does employing a third-party consultant enhance security assessments?
    They provide an unbiased evaluation of policies
  • What is the benefit of going undercover during a security assessment?
    To see if policies are being followed
  • What is the significance of monitoring for suspicious activity?
    It helps in early detection of cyber threats
  • Describe 3 measures that a company could take to reduce the impact of an incident on its customers and business

    • Act immediately any concerns should be addressed straightaway
    • Removing customer data to offline so not accessible
    • Prevention, finding out how the hacker got in and sealing the entry point
    • Communication letting customers know what has happened
    • Publicity rebuilding reputation/appointment of high profile team
  • Evaluate the use of IDS as a method for protecting a network
    • Alarms are raised in real time which requires a network operator to be available and monitoring in order to react.
    • Hacker may use signatures that are matched within the rule base and so will not raise the alarm.
    • Signatures cannot be detected if they are not in the database
    • False positives can be flagged wasting investigation time.
    • IDS look for known weaknesses, these can be avoided by hackers
  • Justify the effectiveness of using NIDS to protect information stored on a server
    • Use of NIDS does not degrade the performance of the system allowing other tasks to run without interruption.
    • Older equipment could be used rather than purchase new equipment as it only needs storage
    • They are independent of the operating systems being used so can be used anywhere on the network.
    • They can be moved around the network targeting specific areas where there are known issues.
    • Can create alerts of potential attack allowing time to react.
  • Explain why it is an advantage to have the procedures written down

    • So no stage is missed out
    • To gather all the information
    • Required to write the report
    • Not knowing who is on site when the attack occurs might be someone not familiar with procedures
    • They will know what steps to take and prevent errors being made
    • Can act with speed to prevent further escalation
    • To identify who to contact
  • Evaluate the importance of the CSIR in preventing future cyber security incidents

    • Will highlight areas of operational weakness in the organisations which can be addressed.
    • Will show how the hack took place which allows OCR phones to patch the vulnerability.
    • Highlights bad practices in OCR phones that can be exploited and allow future hacks to take place.
    • Can be completed by external consultants who will see OCR phones with fresh eyes and not be used to exiting practices.