AP Cyber Security Chapter Test Flashcards
Cyber security
The practice of preventing, detecting, and responding to adversarial attacks.
DDOS
Distributed Denial of Service
A malicious attack with the goal of disrupting a server, service, or network by overwhelming it with a flood of internet traffic.
Network Attack
Attempt to gain unauthorized access to a computer network system, or device with the intent of stealing, damaging, or manipulating data.
Preventing Cyber security Threats
- Strong Passwords
- 2 - factor authentication
- Update anti malware software
- Comply with security policies
Firewall
Security device designed to monitor, filter, and control incoming and outgoing network traffic based on predetermined security rules.
IDS
Intrusion Detection System
Preventive tool, monitors networks for signs of any potential threats or weird activity.
Endpoint Security
Process of protecting your devices from Cyber security threats and attacks.
(Phone, Laptop, Tablet)
Incident Response Plan
PTTIRP
Prep
Threat Identification
Threat Containment
Investigation
Recovery
Post-Incident-Analysis
CIA Triad
Confidentiality
Integrity
Availability
Confidentiality
Data is only accessible by AUTHORIZED individuals, systems, or processes
Integrity
Means that data is accurate and trustworthy
Availability
Data and services are accessible when REQUIRED/NEEDED by authorized individuals.
Signs of Phishing
- Spelling Errors
- Unusual Requests
- Ask for personal details
4 Suspicious Attachments
Firmware
Controls how devices initialize, boot, and communicate with other hardware.
What is an Operating System?
Manages system resources and performs essential system tasks like launching applications.
Operating System Functions
- Launches and manages applications
- Coordinates input/output devices
- Manages CPU, Memory, and Storage Resources
What is Application Software
Software that performs specific tasks for the user
Ex. Internet browsers, Word processors, Music software
What is a driver?
Software that allows a device to communicate with the computer’s operating system.
Virtual Environments
Contains multiple virtual instances, virtual networks, and virtualized components
Stimulate entire data centers
How Virtualization Improves Efficiency
- Pools hardware resources for better utilization
- Reduces the cost of physical hardware
Security Benefits of Virtualization
Virtual instances are isolated from one another, enhancing security.
If one virtual machine is compromised, others on the same machine remain unaffected.
What is a file system?
System for which files are named, stored, and organized on a computer system.
Files
Data stored in a computer (documents, images, etc)
Directories
Locations that can store multiple files and subdirectories (files)
Directory Tree
Hierarchical structure of directories and subdirectories
What is a network?
a system of computers that are able to communicate with each other.
Gives computer users access to the same data, resources, and applications.
LAN
Local Area Network -
is a group of connected computing devices within a localized area that usually share a centralized Internet connection.
WAN
Wide Area Network =
Devices connected across a wide geographic area. Usually, a collection of connected LANS.
Hub
broadcast message
LAN connection devices
hub, switch, WAP
Switch
Connects multiple devices, such as computers, WAPs, printers, and servers on the same network within a building or campus.
Sends the message only to the destination device in the LAN
Wireless Access Point
A switch without wires
Router
Sends the message only to the destination device in the LAN or in the WAN
Metropolitan Network
A private network an entity uses to communicate in a city or local area. Larger than a LAN but smaller than a WAN
SOHO
A type of LAN that serves a small number of devices and users, about 1-20, and typically a small business setting.
Personal Area Network
Connects devices that are the closest to the user. Typically through Bluetooth like headphones, keyboard, mouse.
Binary =
Base 2
Decimal =
Base 10
What does BIT mean?
Binary Digit