1.1 Basic Concepts Flashcards

These terms are the building blocks for further study.

1
Q

Confidentiality

A

Ensures that sensitive information is accessible only to authorized individuals or entities. Involves protecting data from unauthorized access, disclosure, or exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Ensures that data remains accurate, complete, and unaltered during storage, transmission, or processing. Guards against unauthorized modification or tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

Determines the level of access or privileges granted to authenticated users or entities. Ensures users can only access the resources they are authorized to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Ensures systems, networks, and data are accessible and operational when needed. Measures are taken to prevent disruptions or denial-of-service attacks that could render resources unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

Verifies the identity of users or devices attempting to access a system. Confirms individuals or entities are who they claim to be before granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-Repudiation

A

Prevents individuals from denying their actions or transactions. Ensures that actions, such as data exchange or digital signatures, are verifiable and cannot later be denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability

A

A weakness or flaw in a system, application, or process that could be exploited by attackers to gain unauthorized access or cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat

A

Any potential danger or harmful event that could exploit vulnerabilities and compromise security. Threats can be internal or external.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk

A

The likelihood of a threat exploiting a vulnerability and the potential impact of that occurrence. Cybersecurity exists to mitigate risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

Malicious software designed to harm, steal, or disrupt systems or data. Includes viruses, worms, trojans, ransomeware, or spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

Social engineering technique where attackers impersonate trusted people or entities to trick individuals into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewall

A

A security device or software that monitors and controls incoming and outgoing network traffic, acting as a barrier between a trusted internal network and untrusted external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption

A

The process of converting data into a secure code to protect it from unauthorized access. Only those with the decryption key can access the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Patch

A

A software update released by vendors to fix security vulnerabilities and improve functionality. Regularly applying patches helps protect against known threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incident Response

A

The process of identifying, managing, and mitigating the impact of a cybersecurity incident or breach to minimize damage and recover quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social Engineering

A

The phycological manipulation of individuals to trick them into revealing sensitive information or performing actions that may compromise security.

17
Q

Multi-Factor Authentication (MFA)

A

A security mechanism that requires users to provide multiple forms of verification before gaining access to an account or system . It adds an extra layer of security beyond passwords.

18
Q

Denial of Service (DoS) Attack

A

A n attempt to make a computer system or network resource unavailable to its users by overwhelming it with excessive traffic or requests. When this is done using multiple devices it is a Distributed Denial of Service (DDoS)

19
Q

Advanced Persistent Threat (APT)

A

A prolonged and targeted cyberattack by sophisticated adversaries, such as nation-states or well-funded groups. ATPs often aim to steal sensitive information or conduct espionage.

20
Q

Internet of Things (IoT) Security

A

Involves protecting the vast network of devices, ranging from smart home appliances to industrial sensors, from cyber threats.

21
Q

Red Team vs. Blue Team

A

Red Team–Conducts offensive operations and attacks.
Blue Team–Defend against Red Team.
Exercises are done to assess security posture and situational preparedness.

22
Q

Virtual Private Network (VPN)

A

A secure and encrypted connection that allows users to access the internet or a private network while maintaining privacy and anonymity.

23
Q

Zero-Day Exploit

A

An attack that exploits a previously unknown vulnerability in software or systems before a patch or solution is available.

24
Q

Cybersecurity Frameworks

A

Provide a structured approach for organizations to assess, develop, and improve their cybersecurity capabilities. Examples include NIST Cybersecurity Framework, ISO/IEC 27001, and CIS Controls.

25
Q

Cybersecurity Awareness Training

A

Training employees and users to recognize and respond to cybersecurity threats is crucial in reducing the risk of successful cyberattacks.