E.2. Cybersecurity and Continuity Planning Flashcards

Learn about cyber threats, defenses, and planning for business continuity. (36 cards)

1
Q

What are the minimum components a system should include for internet security?

A
  • User account management
  • Firewall
  • Anti-virus protection
  • Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary function of a firewall in internet security?

A

It serves as a barrier between the internal and external networks and prevents unauthorized access to the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does antivirus software protect a computer?

A

It recognizes and incapacitates viruses before they can do damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is encryption in the context of internet security?

A

It is the process of converting data into a code, requiring a key to convert the code back to data, and preventing unauthorized reading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two criteria a program must meet to be considered a virus?

A
  • It must execute itself
  • It must replicate itself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a Trojan horse differ from a virus?

A

A Trojan horse does not replicate itself, whereas a virus does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a worm in the context of computer security?

A

A program that replicates itself from system to system without the use of any host file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virus hoax?

A

It is an email telling the recipient that a file on their computer is a virus when it is actually a file needed by the computer to operate correctly. The email tells them to delete the file, which if done causes the computer to malfunction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some specific computer crimes?

A
  • Copyright infringement
  • Denial of Service (DOS) attacks
  • Intrusions and theft of personal information
  • Phishing
  • Installation of malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of the FBI’s Cyber Division?

A

Responsible for investigating cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a port scanner used for?

A

A software that can probe a server or a computer for open ports. Port scanners have legitimate uses, but they are also used by hackers to locate and exploit vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a sniffer in computer security?

A

A piece of software that grabs all the traffic flowing into and out of a computer attached to a network.

Sniffers have legitimate uses as well as illegitimate uses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the best defense against phishing?

A

For recipients to not respond to emails requesting personal or financial information and to not click on links in such emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a proxy server and its function?

A

It is a computer and software that creates a gateway to and from the internet, handling web access requests and functioning as a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is social engineering in the context of cybercrime?

A

It involves deceiving company employees into divulging information such as passwords, usually through a fraudulent email but it may be through something as simple as a telephone call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between phishing and social engineering?

A
  • Social engineering is targeted to specific persons
  • Phishing involves sending hundreds of thousands of emails in the hope that some of the recipients will fall for the scam.
17
Q

What is dumpster diving in the context of cybercrime?

A

It is sifting through a company’s trash for information that can be used to break into its computers or assist in social engineering.

18
Q

What is the primary responsibility of recipients in preventing phishing and other scams?

A

Employee education is a vital part of internet security.

Recipients need to know:

  • not to respond to any email requesting personal or financial information;
  • not to click on any link in an email that could take them to a spoofed website; and
  • not to open any unexpected email attachments, even if a virus scan has not identified any virus in the attachment.

Recipients of popup “notifications” about malware on their computers should know there is no legitimate scenario in which a computer will tell them it is infected and tell them to call a toll-free number.

19
Q

What is encryption in information systems?

A

It converts data into a code and then a key is required to convert the code back to data.

20
Q

What are the two methods of encryption used for internet security?

A
  • Secret key encryption
  • Public key/private key encryption
21
Q

What is a disadvantage of secret key encryption used for internet security?

A

Every pair of senders and receivers must have a separate set of keys that match.

22
Q

How does public key/private key encryption work in internet security?

A

Each entity publishes a public key for encrypting data while keeping a private key to itself as the only means for decrypting that data.

23
Q

What is the role of a Certificate Authority in public key/private key encryption used for internet security?

A

It validates the company’s identity and then issues a certificate and unique public and private keys.

24
Q

What is business continuity planning?

A

The process of creating and maintaining a plan for recovery in the event of a natural disaster, a cyberattack, or another risk that could put the company out of business.

25
What does business continuity planning involve?
* Defining the risks facing a company in the event of a disaster * Assessing those risks * Creating procedures to mitigate those risks * Regularly testing those procedures to ensure that they work as expected, and * Periodically reviewing the procedures to make sure that they are up to date. ## Footnote Having plans for the backup of data and the recovery of data is also important.
26
What is the purpose of backup procedures in business continuity planning?
To keep program and data files secure so that if something happens to the hardware, the software, or the data files, the processes and data can be recovered.
27
What is electronic vaulting?
Transmitting backup data electronically to the backup site, also called backing up to the cloud.
28
What are some control considerations when backing up data to the cloud?
* Data security * Data privacy * Dependability of the remote location * Legal data requirements of the country where the data is resident
29
What is grandparent-parent-child processing?
Data files from previous periods are retained and if a file is damaged during updating, the previous data files can be used to reconstruct a new current file.
30
What is a fault-tolerant system?
A system designed to tolerate faults or errors, often utilizing redundancy in hardware design, so that if one system fails, another one will take over.
31
What should a disaster recovery plan specify?
* Which employees will participate in disaster recovery and their responsibilities * What hardware, software, and facilities will be used * The priority of applications that should be processed * Arrangements for alternative facilities as a disaster recovery site and offsite storage of the company’s databases
32
What is a hot site in disaster recovery?
A backup facility that has a computer system similar to the one used regularly and is fully operational and immediately available, with all necessary telecommunications hookups for online processing and current, live data being replicated to it in real time from the live site by automated data communications.
33
What is a cold site in disaster recovery?
A facility where space, electric power, and heating and air conditioning are available, but processing equipment and the necessary telecommunications are not immediately available.
34
What is a warm site in disaster recovery?
A site that has the computer equipment and necessary data and communications links installed, but does not have live data.
35
What is a mobile site in disaster recovery?
A disaster recovery site on wheels, which can be a hot site, a warm site, or a cold site.
36
Why should the disaster recovery plan be tested periodically?
To reveal any weaknesses in the plan and ensure it is up to date with organizational and operational changes.