What is Defense in Depth?
It is a cybersecurity risk management strategy that is based on the idea that systems can never be completely secure
It encompasses 3 categories of controls:
- Physical
- Technical
- Administrative
What is layered security?
What are stakeholders in IT?
What is a cybercriminal?
They conduct ransomware attacks to extort money
What is a cyberterrorist?
They interrupt critical systems to spread hear or create civil unrest
Why would a company communicate social media policies to employees as part of a security awareness training program?
They would do that to reduce the risk of aiding cyberattack reconnaissance
What is RECONNAISSANCE?
What is a replay attack?
What is a preventitive control in a replay attack?
It would be to add time/session stamps to all encrypted messages
What is an attack surface?
What are some common authentication techniques?
What is a digital signature?
What is the Internet of Things?
What is Man in the Middle?
It is an attack where attackers can intercept, read, and alter data in transit from one person to another person
What is a buffer overflow attack?
It is an attack that exploits hardware memory limitations
What is a buffer?
It is a temporary storage area used to hold data for processing/transmission
What do software coding errors create?
They create vulnerabilities that attackers can use to overwhelm a system
What is a covert channel attack?
It is a cyberattack technique where an unauthorized intrasystem channel adds small bits of data to the stream without being detected
What is a race condition attack?
What is a SQL injection attack?
It is an attack where a SQL query is injected into an application through a data input field
Organizations use what kind of controls to lessen the risks associated with cyberattacks?
What is virus quarantining?
It corrects a detected incident in which files were infected with spyware, ransomware, malware
What is firewall redundancy?
What is network analysis?