Cybersecurity Fundamental
unit-1(introduction,with resources)
Developed by: Sudipto Krishna Dutta
Computer Science & Engineering
American International University-Bangladesh
Reference: edx.org
Introduction
• Computing Security Concepts and
Problems:
• Define cybersecurity and the responsibilities of cybersecurity
professionals
• Identify types of hackers and their motivations
• Explain how vulnerabilities are identified and addressed
This unit contains the following
learning activities:
• Defining Cybersecurity
• Vulnerabilities
• Personal Security
• Who are the Hackers?
• Data Breaches
• Rising Cybersecurity Threats
Additional Resources
• Comuter Security Concept and Problems
• Data Breaches
• The TCP/IP Guide:This free online guide to the
basic communication language and protocol
of the internet contains clear information on
many of the concepts covered in this course.
• Breaking:Ransomware
Activity and Discussion
• Survey: Your cybersecurity habits
• Word Cloud: Where are threats coming from?
• Discussion: Your role in cybersecurity
• Cyberthreat Maps
Additional Resources
• General
• http://www.informationisbeautiful.net/visualizations/worlds-
biggest-data-breaches-hacks/ , Information is Beautiful
• https://www.cio.com/article/2600345/security0/11-steps-
attackers-took-to-crack-target.html , CIO.com
• https://www.wired.com/2016/03/inside-cunning-
unprecedented-hack-ukraines-power-grid/ , Wired
• http://www.energi.com/news/2017/01/2017-cyber-risks-to-
intensify-as-hackers-become-more-cunning-report/ , Energi
Additional Resources
• Defining Cybersecurity
• https://www.schneier.com/blog/archives/2008/03/the_securi
ty_mi_1.html , Schneier on Security
• https://www.scmagazine.com/cybersecurity-unemployment-
rate-at-zero/article/530120/ , SC Media
Additional Resources
• Vulnerabilities
• Network live IP video cameras directory, http://www.insecam.org/ ,
Insecam.org (This website lets you view video from unsecured
cameras around the world)
• https://www.wired.com/2015/07/hackers-remotely-kill-jeep-
highway/ , Andy , Greenberg, Wired
• https://www.networkworld.com/article/2953836/security/with-
recall-fiat-chrysler-makes-its-car-hack-worse.html , Colin Neagle,
Network World
• https://www.wired.com/2015/07/hackers-remotely-kill-jeep-
highway/ , Jack Corrigan, WGN TV
• http://www.dailymail.co.uk/sciencetech/article-2384826/Satis-
smart-toilets-Japan-hacked-hijacked-remotely.html , Sarah Griffiths,
Daily Mail
Vulnerabilities
(contnd’)
• https://www.cbsnews.com/news/baby-monitor-hacker-
delivers-creepy-message-to-child/ , CBS News
• https://www.wired.com/2014/04/hospital-equipment-
vulnerable/ , Kim Zeller, Wired
• https://www.bloomberg.com/features/2015-hospital-hack/ ,
Monte Reel and Jordan Robertson, Bloomberg
Personal Security
• Here's What We Know About the Massive Cyber Attack That
Took Down the Internet on Friday, Peter Dockrill, Science Alert
• https://www.sciencealert.com/here-s-what-we-know-about-
the-massive-cyber-attack-that-took-down-the-internet-on-
friday Tim Greene, Network World
Who are the Hackers?
• https://www.networkworld.com/article/2330
885/lan-wan/meeces-to-pieces.html ,
Deborah Radcliff, Network World
ADDITIONAL RESOURCES: DATA
BREACHES
• http://www.zdnet.com/article/anatomy-of-the-target-data-breach-
missed-opportunities-and-lessons-learned/ , Michael Kassner, ZD
Net
• https://threatpost.com/two-factor-snafu-opened-door-to-
jpmorgan-breach/110119/ , Michael Mimoso, Threatpost
• https://www.infosecurity-magazine.com/news/home-depot-
breach-third-party/ , Tara Seals, Infosecurity Magazine
• https://www.bloomberg.com/news/articles/2014-09-18/home-
depot-hacked-after-months-of-security-warnings , Benjamin Elgin,
Michael Riley, and Dune Lawrence, Bloomberg
• https://www.engadget.com/2014/12/10/sony-pictures-hack-the-
whole-story/ , Edgar Alvarez, Engadget
• https://www.wired.com/2016/10/inside-cyberattack-shocked-us-
government/ , Brendan I. Koerner, Wired
ADDITIONAL RESOURCES: DATA
BREACHES(CONTD’)
• http://fortune.com/2015/08/26/ashley-madison-hack/ , Robert Hackett, Fortune
• http://www.dailymail.co.uk/femail/article-3766961/Ashley-Madison-members-
reveal-devastating-impact-year-s-hack.html
• http://www.dailymail.co.uk/femail/article-3766961/Ashley-Madison-members-
reveal-devastating-impact-year-s-hack.html , Martha Clifford, Daily Mail
• https://www.washingtonpost.com/news/the-switch/wp/2016/07/19/this-basic-
security-mistake-led-to-the-houston-astros-hack-that-shook-
baseball/?utm_term=.d0eb63369918 , Martha Clifford, Daily Mail
• https://www.washingtonpost.com/news/the-switch/wp/2016/07/19/this-basic-
security-mistake-led-to-the-houston-astros-hack-that-shook-
baseball/?utm_term=.c675468058b7
• https://www.washingtonpost.com/news/the-switch/wp/2016/07/19/this-basic-
security-mistake-led-to-the-houston-astros-hack-that-shook-
baseball/?utm_term=.8e8fe023fcec , Andrea Petersen, The Washington Post
• http://www.dailymail.co.uk/femail/article-3766961/Ashley-Madison-members-
reveal-devastating-impact-year-s-hack.html
• http://www.bbc.com/news/technology-33083050 , BBC
ADDITIONAL RESOURCES: DATA
BREACHES(CONTD’)
• http://www.pcworld.com/article/2936621/the-lastpass-security-breach-what-you-need-to-know-
do-and-watch-out-for.html , Ian Paul, PC World
• https://arstechnica.com/information-technology/2016/04/how-hacking-team-got-hacked-phineas-
phisher/ , J.M. Porup, Ars Technica
• http://fortune.com/2015/09/10/hack-health-insurer-bluecross/ , Claire Groden, Fortune
• https://www.nytimes.com/2015/02/06/business/experts-suspect-lax-security-left-anthem-
vulnerable-to-hackers.html?_r=0 Reed Abelson and Matthew Goldstein, The New York Times
• http://money.cnn.com/2015/03/17/technology/security/premera-hack/ , Jose Pagliery, CNN
• https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ ,
KimZetter, Wired
• https://www.technologyreview.com/s/603262/ukraines-power-grid-gets-hacked-again-a-worrying-
sign-for-infrastructure-attacks/ , Jamie Condliffe, MIT Technology Review
• https://thehackernews.com/2016/03/bank-hack.html , The Hacker News
• http://fortune.com/2016/09/26/swift-hack/ , Reuters, Fortune
• https://www.engadget.com/2016/05/04/gmail-hotmail-yahoo-email-data-breach/ , Nathan
Ingraham, Engadget
• https://www.wired.com/2016/05/hack-brief-old-myspace-account-just-came-back-haunt/ , Brian
Barrett, Wired
• http://www.techtimes.com/articles/159461/20160519/linkedin-urges-users-to-change-passwords-
hacker-puts-117-million-accounts-up-for-sale.htm , Dave Calpito, Tech Times
• http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/ , Seth Fingerman, CNN
ADDITIONAL RESOURCES: DATA
BREACHES(CONTD’)
• https://www.nytimes.com/2016/12/14/technology/yahoo-
hack.html , Vindu Goel and Nicole Perlroth, The New York Times
• https://krebsonsecurity.com/2017/01/the-download-on-the-dnc-
hack , Krebs on Security
• http://www.nbcnews.com/news/us-news/guccifer-2-0-releases-
documents-dccc-hack-n629631 , Tom Winter, Alex Seitz-Wald and
Phil Helsel, NBC News
• http://www.businessinsider.com/hillary-clinton-campaign-john-
podesta-got-hacked-by-phishing-2016-10 , Ben Gilbert, Business
Insider
• https://nakedsecurity.sophos.com/2016/12/16/dnc-chief-podesta-
led-to-phishing-link-thanks-to-a-typo/ Lisa Vaas, Naked Security
• https://www.wired.com/2015/03/clintons-email-server-vulnerable/
, Andy Greenberg, Wired
BREAKING: RANSOMWARE
• In the unit's last video, recorded months ago, I
predicted something like this. Less than two
weeks before this course opened, it
happened!
• Here are some articles about the WannaCry
ransomware attack and its aftermath.
BREAKING: RANSOMWARE(CONTD’)
• https://krebsonsecurity.com/2017/05/u-k-hospitals-hit-in-widespread-ransomware-attack/ Krebs on
Security
• https://arstechnica.com/information-technology/2017/05/nhs-ransomware-cyber-attack/ , Ars Technica
• https://en.wikipedia.org/wiki/WannaCry_ransomware_attack , Wikipedia
• https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ ,
Ian Sherr, CNET
• https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware ,
Symantec Security Response, Symantec Connect
• https://www.wired.com/2017/05/accidental-kill-switch-slowed-fridays-massive-ransomware-attack/ , Lily
Hay Newman, Wired
• https://www.theguardian.com/technology/2017/may/22/wannacry-hackers-ransomware-attack-kill-
switch-windows-xp-7-nhs-accidental-hero-marcus-hutchins , Samuel Gibbs, The Guardian
• https://www.helpnetsecurity.com/2017/05/18/wannacry-smb-risk/ , Andrew Stuart, (IN)SECURE Magazine
• http://www.darkreading.com/threat-intelligence/wannacry-hit-windows-7-machines-most/d/d-
id/1328934 , Kelly Jackson Higgins, Dark Reading
• https://www.wired.com/2017/05/wannacry-flaw-help-windows-xp-victims-get-files-back/ , Andy
Greenberg, Wired
• https://thehackernews.com/2017/05/wannacry-ransomware-decryption-tool.html Swati Khandelwal, The
Hacker News
• https://www.networkworld.com/article/3197003/security/why-wannacry-won-t-change-anything.html ,
Fredric Paul, Network World
Activities
• Create unique passwords for different accounts?
• Update passwords on a regular basis?
• Back up data to an external drive or location?
• Keep your operating system, browser, and anti-
virus software up to date?
• Pay close attention to website URLs?
• Check on unknown links sent through email
before clicking on them?
Activities(contd’)
• Word cloud: Where are threats coming from?
– In the box below, enter a word or short phrase
indicating what you think the major threat to
cybersecurity in the next twelve months will be.
CYBERTHREAT MAPS
• Here is one example of a real-time cyberthreat map
(threatmap.fortiguard.com).
• This is the reason you are all here. It can give you an idea of
what is happening in the world as you are taking the
initiative to make it a better place!
• Links to other visualizations of worldwide cyberthreat
activity:
• http://www.fireeye.com/cyber-map/threat-map.html,
FireEye, Inc.
• http://cybermap.kaspersky.com/, Kaspersky Lab
• http://www.digitalattackmap.com/#anim=1&color=0&coun
try=ALL&time=16365&view=map , Arbor Networks
• http://map.norsecorp.com/
Question
• Hacks into systems with malicious intent .
• Hacks into systems, without permission, and
requests payment to fix vulnerabilities .
• Hacks into systems, with permission, to
uncover vulnerabilities so they can be fixed.
Question
• What is always going to be the weakest link of
any cybersecurity system?
• Firewalls?
• Malware?
• Humans?
• Encryption?
Question
• Which type of hacking does not involve any
technology?
• DDoS?
• Penetration Testing?
• Social Engineering?
• White Hat Hacking?
Question
• How do the growth rates of attack
sophistication and intruder technical
knowledge compare?
• Attack sophistication is growing more quickly?
• Intruder technical knowledge is growing more
quickly?
• They are growing at the same rate?
• They are both declining?
Question
• Why is the MySpace hack still relevant today?
• Existing pages will be defaced?
• People reuse passwords?
• Credit card information might still be the
same?
Question
• True or False: Cybersecurity involves
protecting data while it is in transit, while it is
being processed, and when it is at rest.
• True?
/
• False?
Question
• Which two breaches started when a third-
party’s credentials were compromised? (Select
two)
• Home Depot?
• Chase?
• Target?
Question
• The first hack of the Ukraine Power Grid
started when an employee:
• Clicked on a link from PayPal?
• Opened a Microsoft Word document?
• Responded to spam?
• Got fooled by a phone call and gave out
confidential information verbally?
Question
• f integrity hacks become prevalent, a direct
result could be an increase in:
• The amount of malware?
• The amount of Internet of Things devices
affected?
• The amount of time hackers can lurk on a
network undetected?
• The number of ransomware attacks?
END
thank you!

Cybersecurity fundamental

  • 1.
    Cybersecurity Fundamental unit-1(introduction,with resources) Developedby: Sudipto Krishna Dutta Computer Science & Engineering American International University-Bangladesh Reference: edx.org
  • 2.
    Introduction • Computing SecurityConcepts and Problems: • Define cybersecurity and the responsibilities of cybersecurity professionals • Identify types of hackers and their motivations • Explain how vulnerabilities are identified and addressed
  • 3.
    This unit containsthe following learning activities: • Defining Cybersecurity • Vulnerabilities • Personal Security • Who are the Hackers? • Data Breaches • Rising Cybersecurity Threats
  • 4.
    Additional Resources • ComuterSecurity Concept and Problems • Data Breaches • The TCP/IP Guide:This free online guide to the basic communication language and protocol of the internet contains clear information on many of the concepts covered in this course. • Breaking:Ransomware
  • 5.
    Activity and Discussion •Survey: Your cybersecurity habits • Word Cloud: Where are threats coming from? • Discussion: Your role in cybersecurity • Cyberthreat Maps
  • 6.
    Additional Resources • General •http://www.informationisbeautiful.net/visualizations/worlds- biggest-data-breaches-hacks/ , Information is Beautiful • https://www.cio.com/article/2600345/security0/11-steps- attackers-took-to-crack-target.html , CIO.com • https://www.wired.com/2016/03/inside-cunning- unprecedented-hack-ukraines-power-grid/ , Wired • http://www.energi.com/news/2017/01/2017-cyber-risks-to- intensify-as-hackers-become-more-cunning-report/ , Energi
  • 7.
    Additional Resources • DefiningCybersecurity • https://www.schneier.com/blog/archives/2008/03/the_securi ty_mi_1.html , Schneier on Security • https://www.scmagazine.com/cybersecurity-unemployment- rate-at-zero/article/530120/ , SC Media
  • 8.
    Additional Resources • Vulnerabilities •Network live IP video cameras directory, http://www.insecam.org/ , Insecam.org (This website lets you view video from unsecured cameras around the world) • https://www.wired.com/2015/07/hackers-remotely-kill-jeep- highway/ , Andy , Greenberg, Wired • https://www.networkworld.com/article/2953836/security/with- recall-fiat-chrysler-makes-its-car-hack-worse.html , Colin Neagle, Network World • https://www.wired.com/2015/07/hackers-remotely-kill-jeep- highway/ , Jack Corrigan, WGN TV • http://www.dailymail.co.uk/sciencetech/article-2384826/Satis- smart-toilets-Japan-hacked-hijacked-remotely.html , Sarah Griffiths, Daily Mail
  • 9.
    Vulnerabilities (contnd’) • https://www.cbsnews.com/news/baby-monitor-hacker- delivers-creepy-message-to-child/ ,CBS News • https://www.wired.com/2014/04/hospital-equipment- vulnerable/ , Kim Zeller, Wired • https://www.bloomberg.com/features/2015-hospital-hack/ , Monte Reel and Jordan Robertson, Bloomberg
  • 10.
    Personal Security • Here'sWhat We Know About the Massive Cyber Attack That Took Down the Internet on Friday, Peter Dockrill, Science Alert • https://www.sciencealert.com/here-s-what-we-know-about- the-massive-cyber-attack-that-took-down-the-internet-on- friday Tim Greene, Network World
  • 11.
    Who are theHackers? • https://www.networkworld.com/article/2330 885/lan-wan/meeces-to-pieces.html , Deborah Radcliff, Network World
  • 12.
    ADDITIONAL RESOURCES: DATA BREACHES •http://www.zdnet.com/article/anatomy-of-the-target-data-breach- missed-opportunities-and-lessons-learned/ , Michael Kassner, ZD Net • https://threatpost.com/two-factor-snafu-opened-door-to- jpmorgan-breach/110119/ , Michael Mimoso, Threatpost • https://www.infosecurity-magazine.com/news/home-depot- breach-third-party/ , Tara Seals, Infosecurity Magazine • https://www.bloomberg.com/news/articles/2014-09-18/home- depot-hacked-after-months-of-security-warnings , Benjamin Elgin, Michael Riley, and Dune Lawrence, Bloomberg • https://www.engadget.com/2014/12/10/sony-pictures-hack-the- whole-story/ , Edgar Alvarez, Engadget • https://www.wired.com/2016/10/inside-cyberattack-shocked-us- government/ , Brendan I. Koerner, Wired
  • 13.
    ADDITIONAL RESOURCES: DATA BREACHES(CONTD’) •http://fortune.com/2015/08/26/ashley-madison-hack/ , Robert Hackett, Fortune • http://www.dailymail.co.uk/femail/article-3766961/Ashley-Madison-members- reveal-devastating-impact-year-s-hack.html • http://www.dailymail.co.uk/femail/article-3766961/Ashley-Madison-members- reveal-devastating-impact-year-s-hack.html , Martha Clifford, Daily Mail • https://www.washingtonpost.com/news/the-switch/wp/2016/07/19/this-basic- security-mistake-led-to-the-houston-astros-hack-that-shook- baseball/?utm_term=.d0eb63369918 , Martha Clifford, Daily Mail • https://www.washingtonpost.com/news/the-switch/wp/2016/07/19/this-basic- security-mistake-led-to-the-houston-astros-hack-that-shook- baseball/?utm_term=.c675468058b7 • https://www.washingtonpost.com/news/the-switch/wp/2016/07/19/this-basic- security-mistake-led-to-the-houston-astros-hack-that-shook- baseball/?utm_term=.8e8fe023fcec , Andrea Petersen, The Washington Post • http://www.dailymail.co.uk/femail/article-3766961/Ashley-Madison-members- reveal-devastating-impact-year-s-hack.html • http://www.bbc.com/news/technology-33083050 , BBC
  • 14.
    ADDITIONAL RESOURCES: DATA BREACHES(CONTD’) •http://www.pcworld.com/article/2936621/the-lastpass-security-breach-what-you-need-to-know- do-and-watch-out-for.html , Ian Paul, PC World • https://arstechnica.com/information-technology/2016/04/how-hacking-team-got-hacked-phineas- phisher/ , J.M. Porup, Ars Technica • http://fortune.com/2015/09/10/hack-health-insurer-bluecross/ , Claire Groden, Fortune • https://www.nytimes.com/2015/02/06/business/experts-suspect-lax-security-left-anthem- vulnerable-to-hackers.html?_r=0 Reed Abelson and Matthew Goldstein, The New York Times • http://money.cnn.com/2015/03/17/technology/security/premera-hack/ , Jose Pagliery, CNN • https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ , KimZetter, Wired • https://www.technologyreview.com/s/603262/ukraines-power-grid-gets-hacked-again-a-worrying- sign-for-infrastructure-attacks/ , Jamie Condliffe, MIT Technology Review • https://thehackernews.com/2016/03/bank-hack.html , The Hacker News • http://fortune.com/2016/09/26/swift-hack/ , Reuters, Fortune • https://www.engadget.com/2016/05/04/gmail-hotmail-yahoo-email-data-breach/ , Nathan Ingraham, Engadget • https://www.wired.com/2016/05/hack-brief-old-myspace-account-just-came-back-haunt/ , Brian Barrett, Wired • http://www.techtimes.com/articles/159461/20160519/linkedin-urges-users-to-change-passwords- hacker-puts-117-million-accounts-up-for-sale.htm , Dave Calpito, Tech Times • http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/ , Seth Fingerman, CNN
  • 15.
    ADDITIONAL RESOURCES: DATA BREACHES(CONTD’) •https://www.nytimes.com/2016/12/14/technology/yahoo- hack.html , Vindu Goel and Nicole Perlroth, The New York Times • https://krebsonsecurity.com/2017/01/the-download-on-the-dnc- hack , Krebs on Security • http://www.nbcnews.com/news/us-news/guccifer-2-0-releases- documents-dccc-hack-n629631 , Tom Winter, Alex Seitz-Wald and Phil Helsel, NBC News • http://www.businessinsider.com/hillary-clinton-campaign-john- podesta-got-hacked-by-phishing-2016-10 , Ben Gilbert, Business Insider • https://nakedsecurity.sophos.com/2016/12/16/dnc-chief-podesta- led-to-phishing-link-thanks-to-a-typo/ Lisa Vaas, Naked Security • https://www.wired.com/2015/03/clintons-email-server-vulnerable/ , Andy Greenberg, Wired
  • 16.
    BREAKING: RANSOMWARE • Inthe unit's last video, recorded months ago, I predicted something like this. Less than two weeks before this course opened, it happened! • Here are some articles about the WannaCry ransomware attack and its aftermath.
  • 17.
    BREAKING: RANSOMWARE(CONTD’) • https://krebsonsecurity.com/2017/05/u-k-hospitals-hit-in-widespread-ransomware-attack/Krebs on Security • https://arstechnica.com/information-technology/2017/05/nhs-ransomware-cyber-attack/ , Ars Technica • https://en.wikipedia.org/wiki/WannaCry_ransomware_attack , Wikipedia • https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ , Ian Sherr, CNET • https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware , Symantec Security Response, Symantec Connect • https://www.wired.com/2017/05/accidental-kill-switch-slowed-fridays-massive-ransomware-attack/ , Lily Hay Newman, Wired • https://www.theguardian.com/technology/2017/may/22/wannacry-hackers-ransomware-attack-kill- switch-windows-xp-7-nhs-accidental-hero-marcus-hutchins , Samuel Gibbs, The Guardian • https://www.helpnetsecurity.com/2017/05/18/wannacry-smb-risk/ , Andrew Stuart, (IN)SECURE Magazine • http://www.darkreading.com/threat-intelligence/wannacry-hit-windows-7-machines-most/d/d- id/1328934 , Kelly Jackson Higgins, Dark Reading • https://www.wired.com/2017/05/wannacry-flaw-help-windows-xp-victims-get-files-back/ , Andy Greenberg, Wired • https://thehackernews.com/2017/05/wannacry-ransomware-decryption-tool.html Swati Khandelwal, The Hacker News • https://www.networkworld.com/article/3197003/security/why-wannacry-won-t-change-anything.html , Fredric Paul, Network World
  • 18.
    Activities • Create uniquepasswords for different accounts? • Update passwords on a regular basis? • Back up data to an external drive or location? • Keep your operating system, browser, and anti- virus software up to date? • Pay close attention to website URLs? • Check on unknown links sent through email before clicking on them?
  • 19.
    Activities(contd’) • Word cloud:Where are threats coming from? – In the box below, enter a word or short phrase indicating what you think the major threat to cybersecurity in the next twelve months will be.
  • 20.
    CYBERTHREAT MAPS • Hereis one example of a real-time cyberthreat map (threatmap.fortiguard.com). • This is the reason you are all here. It can give you an idea of what is happening in the world as you are taking the initiative to make it a better place! • Links to other visualizations of worldwide cyberthreat activity: • http://www.fireeye.com/cyber-map/threat-map.html, FireEye, Inc. • http://cybermap.kaspersky.com/, Kaspersky Lab • http://www.digitalattackmap.com/#anim=1&color=0&coun try=ALL&time=16365&view=map , Arbor Networks • http://map.norsecorp.com/
  • 21.
    Question • Hacks intosystems with malicious intent . • Hacks into systems, without permission, and requests payment to fix vulnerabilities . • Hacks into systems, with permission, to uncover vulnerabilities so they can be fixed.
  • 22.
    Question • What isalways going to be the weakest link of any cybersecurity system? • Firewalls? • Malware? • Humans? • Encryption?
  • 23.
    Question • Which typeof hacking does not involve any technology? • DDoS? • Penetration Testing? • Social Engineering? • White Hat Hacking?
  • 24.
    Question • How dothe growth rates of attack sophistication and intruder technical knowledge compare? • Attack sophistication is growing more quickly? • Intruder technical knowledge is growing more quickly? • They are growing at the same rate? • They are both declining?
  • 25.
    Question • Why isthe MySpace hack still relevant today? • Existing pages will be defaced? • People reuse passwords? • Credit card information might still be the same?
  • 26.
    Question • True orFalse: Cybersecurity involves protecting data while it is in transit, while it is being processed, and when it is at rest. • True? / • False?
  • 27.
    Question • Which twobreaches started when a third- party’s credentials were compromised? (Select two) • Home Depot? • Chase? • Target?
  • 28.
    Question • The firsthack of the Ukraine Power Grid started when an employee: • Clicked on a link from PayPal? • Opened a Microsoft Word document? • Responded to spam? • Got fooled by a phone call and gave out confidential information verbally?
  • 29.
    Question • f integrityhacks become prevalent, a direct result could be an increase in: • The amount of malware? • The amount of Internet of Things devices affected? • The amount of time hackers can lurk on a network undetected? • The number of ransomware attacks?
  • 30.