all Flashcards
The cybersecurity countermeasure technologies include cloud based technologies . Name the three types of cloud based services which could be implemented for technological safeguard
software as a serivce (SaaS)
infrastructure as a service (IaaS)
virtual security appliance
describe one malware that requires users intervention
virus
what are the three principles of security
confidentiality , availability , integrity
describe one malware that does not require user participation
worms
a malware silently carries out malicious operation while peter plays an online game . what malware is that?
Trojan
describe four types of spoofing attacks
mac spoofing
ip spoofing
arp spoofing
dns spoofing
which malware modifies the operating system to create a backdoor to allow attackers to use the backdoor to access the computer remotely
rootkit
the security protocol used in wifi to replace WEP is
WPA
explain one software that enables a criminal to obtain information about a user computer activities
spyware
what are the three objectives for implementation within the cybersecurity policies and procedures
standards
guidelines
the procedures
what are three states of data
data in transit
data at rest
data in process
peter comes across a suspicious email from a popular retail store asking him to click a link to claim a prize . what is the possible malware that is accociated with this scenario
phishing
four triggers that could awaken a malicious program like logic bomb are
date
time
programs
delete user account
what are the three security services for controlling access
authentication
authorization
accounting
what workforce framework categorizes cybersecurity work into seven categories.
operate and Maintain
protect and Defend
investigate
collect and operate
analyze
oversight and development
securely provision
what are the three classification of hackers?
white hat , black hat, grey hat