all Flashcards
The cybersecurity countermeasure technologies include cloud based technologies . Name the three types of cloud based services which could be implemented for technological safeguard
software as a serivce (SaaS)
infrastructure as a service (IaaS)
virtual security appliance
describe one malware that requires users intervention
virus
what are the three principles of security
confidentiality , availability , integrity
describe one malware that does not require user participation
worms
a malware silently carries out malicious operation while peter plays an online game . what malware is that?
Trojan
describe four types of spoofing attacks
mac spoofing
ip spoofing
arp spoofing
dns spoofing
which malware modifies the operating system to create a backdoor to allow attackers to use the backdoor to access the computer remotely
rootkit
the security protocol used in wifi to replace WEP is
WPA
explain one software that enables a criminal to obtain information about a user computer activities
spyware
what are the three objectives for implementation within the cybersecurity policies and procedures
standards
guidelines
the procedures
what are three states of data
data in transit
data at rest
data in process
peter comes across a suspicious email from a popular retail store asking him to click a link to claim a prize . what is the possible malware that is accociated with this scenario
phishing
four triggers that could awaken a malicious program like logic bomb are
date
time
programs
delete user account
what are the three security services for controlling access
authentication
authorization
accounting
what workforce framework categorizes cybersecurity work into seven categories.
operate and Maintain
protect and Defend
investigate
collect and operate
analyze
oversight and development
securely provision
what are the three classification of hackers?
white hat , black hat, grey hat
explain two characteristics of malware in computer systems
disrupt
gain access
what tools criminals use to capture data streams over a network?
packet-sniffing
name one computer hardware component that logic bomb can destroy.
logic bomb can destroy computer hardware component such as cooling fans , CPU,power supplies , hard drives and _______________
Memory
state two type of access control
physical
logical
a computer attack that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor is known as _____________
Zero-Day attack
peter provided his bank account information to a stranger who pretended as a government official to confirm his identity . what is the deception technique that the stranger is using.
pretexting
what is another term for piggybacking
tailgating
when data goes beyond the limits of a buffer , it is known as _______
buffer overflow
describe one malware that attacks a computer system or the data it contains , captive until the target makes a payment
ransomware
provide one method of creating ciphertext
any1
transposition
substitution
one-time pad
list two types of encryption algorithm and provide one encryption standard for each class
symmetric
AES
asymmetric
ECC
list two types of encryption algorithm
symmetric
asymmetric
list two protocols that uses asymmetric key algorithms
IKE
SSL
SSH
PGP
describe virtual private network
private network
uses a public network/internet
create secure channel
name three types of authentication methods
what you know
what you have
who you are
define three authorization in access control
controls what a user can
cannot do
after successful authentication
provide three types of security controls
deterrent
detective
corrective
state three different between symmetric and asymmetric
s. more problematic
harder to manage
a. more secure
peter met a lady in the bar who tired to gather information on his company participation in a new government project. describe the non technical deception technique used in this scenario
social engineering
describe data masking
1.technology that secures data
2.replacing sensitive information with a non-sensitive looks like the original
3.non sensitive looks like the original
provide two data masking techniques
substitution
shuffling
what is steganography
conceals data/message
in another file
describe three components involved in steganography
embedded data
cover text
stego-key
what is data obfuscation
harder to understand
use and practice of data masking
and steganography