1.1 Cybersec mindset Flashcards

1
Q

Cybersecurity

A

The assessment of threats and the mitigation of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why use virtual machines?

A

Virtual machines allow us to run different operating systems.
We can access a network of those machines on the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does CIA stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

The state of keeping or being kept secret or private.
-ensuring sensitive information does not reach unauthorized people; “need to know”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

The quality of being honest, whole, or undivided.
-refers to protecting information from being modified by unauthorized people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

The quality of being able to be used or obtained.
-concerns occur when operating systems, equipment, and data are not functioning correctly and thus are not accessible by those who need it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat assessment

A

The structured process of identifying the threats posed to a group or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk mitigation

A

The systematic reduction of the impact and likely occurrence of a negative event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical machines

A

bare metal machines, are physical computers that have hardware components used to run a variety of tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

virtual machines (VMs)

A

an application that acts like a completely different physical computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering

A

The act of deceiving an individual into revealing sensitive information, obtaining unauthorized access, or committing fraud by gaining confidence and trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing attack:

A

A technique for attempting to acquire sensitive data, such as credit card numbers, usernames, or passwords, through fraudulent solicitation (e.g., email). The perpetrator pretends to be a reputable business or person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

Hardware, software, or firmware meant to perform an unauthorized process that will compromise the confidentiality, integrity, or availability of a system (e.g., a virus, worm, Trojan horse, or other code-based entity that infects a host).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Man-in-middle attack (MitM)

A

An attack where the adversary positions themself between the user and the system so that they can intercept and alter data traveling between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packet sniffer

A

Software that monitors network traffic on wired or wireless networks and captures packets. Packet sniffers are used by network managers to monitor and analyze traffic, but hackers also use them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brute force attack

A

An attack that involves trying all possible authentication combinations to find a match.

17
Q

Code injection

A

Type of attack that injects code that is then interpreted and executed by the target application.

18
Q

Keylogger

A

A program designed to record which keys are pressed on your computer keyboard. It can obtain passwords or encryption keys and use these to bypass security measures.