0. Introduction Flashcards

1
Q

Confidentiality

A

Keeping systems and data from being accessed, seen, and read to anyone who is not authorized to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Protect the data from modification or deletion by unauthorized parties, and ensuring that when authorized people make changes that shouldnt have been made the damage can be undone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Systems, access channels, and authentication mechanisms must all be working properly for the information they provide and protect to be available when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Non-Repudiation

A

The assurance that someone cannot deny the validity of something. legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Black Hat hacker

A

Hackers that seek to perform malicious activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Grey Hat hacker

A

Hackers that perform good or bad activities but do not have the permission of the organization they are hacking against

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

White Hat Hacker

A

Ethical hackers; they use their skills to improve security by exposing vulnerabilities before malicious hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Script Kiddie/Skiddies

A

Unskilled individual who uses malicious scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State-Sponsored Hacker

A

hacker that is hired by a government or entity related

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacktivist

A

Someone who hacks for a cause; political reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Suicide hackers

A

These hackers are not afraid of going to jail or facing any sort of punishment, they hack to get the job done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cyberterrorist

A

Motivated by religious or political reasons to create fear or disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hack Value

A

Perceived value or worth of a target as seen by the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerability

A

A system flaw, weakness on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat

A

Exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Exploit

A

These are a way of gaining access to a system through a security flaw and taking advantage of the flaw for their benefit

17
Q

Payload

A

Component of an attack; it is the part of the private user text which could also contain malware such as worms or viruses which perform the malicious action.

18
Q

Zero-Day Attack

A

Attack that occurs before a vendor knows or is able to patch a flaw

19
Q

Daisy Chaining / Pivotting

A

It involves gaining access to a network and/or computer and then using the same information to gain access to multiple networks and computers that contains desirable information

20
Q

Enterprise Information Security Architecture (EISA)

A

Determines the structure and behavior of organizations information systems through processes, requirements, principles and models.