From My book

Cards (10)

  • Types of Cyber Security Incidents
    • unauthorised access
    • information disclosure
    • modification
    • inaccessible data
    • destruction
    • theft
  • What are the two types of modification of data
    Accidental and Intentional
  • What must you consider in risk management
    • Identify assets and analyse risks
    • Mitigate risks
    • Protecting vulnerabilities
    • Remediation
    • Cost benefit
    • Monitoring and controlling
  • Why should we identify assets?
    So you know what the target could be
  • Why do we need to know the cost of the asset
    To see if the cost of protection methods match the cost of asset
  • How to mitigate risk
    • control systems
    • Log files
    • Vulnerability scanners
    • Risk management policies
  • Methods for remediation
    • Patch deployment
    • Manual
    • Automated tools
  • What are the 6 topics within the vulnerability management life cycle
    • Identify risks
    • Priorities assets
    • Assess
    • Report
    • Remediate
    • Verify
  • What is the importance of logging acitivty
    Able to track possible incidents within the organisation
    Spot patterns encase of attacks or identify attacks
  • What are the key things you must consider testing
    • Social Engineering of employees
    • Physical security
    • Network services