1.1 Cybersec mindset Flashcards
Cybersecurity
The assessment of threats and the mitigation of risk.
Why use virtual machines?
Virtual machines allow us to run different operating systems.
We can access a network of those machines on the cloud.
What does CIA stand for?
Confidentiality, Integrity, Availability
Confidentiality
The state of keeping or being kept secret or private.
-ensuring sensitive information does not reach unauthorized people; “need to know”
Integrity
The quality of being honest, whole, or undivided.
-refers to protecting information from being modified by unauthorized people.
Availability
The quality of being able to be used or obtained.
-concerns occur when operating systems, equipment, and data are not functioning correctly and thus are not accessible by those who need it.
Threat assessment
The structured process of identifying the threats posed to a group or system.
Risk mitigation
The systematic reduction of the impact and likely occurrence of a negative event.
Physical machines
bare metal machines, are physical computers that have hardware components used to run a variety of tasks.
virtual machines (VMs)
an application that acts like a completely different physical computer
Social engineering
The act of deceiving an individual into revealing sensitive information, obtaining unauthorized access, or committing fraud by gaining confidence and trust.
Phishing attack:
A technique for attempting to acquire sensitive data, such as credit card numbers, usernames, or passwords, through fraudulent solicitation (e.g., email). The perpetrator pretends to be a reputable business or person.
Malware
Hardware, software, or firmware meant to perform an unauthorized process that will compromise the confidentiality, integrity, or availability of a system (e.g., a virus, worm, Trojan horse, or other code-based entity that infects a host).
Man-in-middle attack (MitM)
An attack where the adversary positions themself between the user and the system so that they can intercept and alter data traveling between them.
Packet sniffer
Software that monitors network traffic on wired or wireless networks and captures packets. Packet sniffers are used by network managers to monitor and analyze traffic, but hackers also use them.