AP Cyber Security Chapter Test Flashcards
Cyber security
The practice of preventing, detecting, and responding to adversarial attacks.
DDOS
Distributed Denial of Service
A malicious attack with the goal of disrupting a server, service, or network by overwhelming it with a flood of internet traffic.
Network Attack
Attempt to gain unauthorized access to a computer network system, or device with the intent of stealing, damaging, or manipulating data.
Preventing Cyber security Threats
- Strong Passwords
- 2 - factor authentication
- Update anti malware software
- Comply with security policies
Firewall
Security device designed to monitor, filter, and control incoming and outgoing network traffic based on predetermined security rules.
IDS
Intrusion Detection System
Preventive tool, monitors networks for signs of any potential threats or weird activity.
Endpoint Security
Process of protecting your devices from Cyber security threats and attacks.
(Phone, Laptop, Tablet)
Incident Response Plan
PTTIRP
Prep
Threat Identification
Threat Containment
Investigation
Recovery
Post-Incident-Analysis
CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
Data is only accessible by AUTHORIZED individuals, systems, or processes
Integrity
Means that data is accurate and trustworthy
Availability
Data and services are accessible when REQUIRED/NEEDED by authorized individuals.
Signs of Phishing
- Spelling Errors
- Unusual Requests
- Ask for personal details
4 Suspicious Attachments
Firmware
Controls how devices initialize, boot, and communicate with other hardware.
What is an Operating System?
Manages system resources and performs essential system tasks like launching applications.