Basic Flashcards

1
Q

What is Cyber security?

A

It is the practice of ensuring confidentiality, integrity, and availability of information by protecting systems, networks, people, and data from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is PII and SPII?

A

PII - personally identifiable information - It is the information that confirms someone’s identity. Information like IP, MAC address, name, Home address

SPII - Sensitive personally identifiable information - It is the information that falls under stricter handling guidelines. Information like Biometrics, PAN card number, SIN number, and financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Security Posture.

A

An organization’s ability to manage its defense of critical assets and data and react to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What were Brain Virus and Morris Worm attack (these are 2 old attacks)?

A

Brain Virus - It was a type of virus that was created to keep pirated copies of software in check. If someone installed the pirated copy, this virus start crashing their systems.

Morris attack - It was created to know the number of devices connected to the internet. But it failed to identify the devices on which this worm was installed and kept on installing the worm until the system crashed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Social Engineering?

A

It is an manipulation technique in which the attacker tricks people with the intent of stealing information from users or gaining unauthorized access to networks, systems, and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is phishing and its types?

A

It is an attack in which the attacker uses digital communication to trick people to get their personal information or to install malware on their system.

Different kinds of phishing include - BEC (Business email compromise), Whaling, Spear phishing, Vishing (Voice communication is exploited), Smishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Virus and a worm?

A

Virus - it is a malicious code that changes the code of computer programs on which it is deployed. Virus needs user action to be activated like opening some infected executable in some email or on a website.

Worm - it is also a malicious code that can self replicated onto other devices on the network. It does not need user action to be initiated.

Spyware -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Watering Hole attack?

A

In a watering hole attack, the threat attacker attacks a website that is frequently visited by a specific group of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the CISSP (Certified information system security professional) domains?

A
  1. Security and Risk management domain
  2. Asset management
  3. Security Architecture and Engineering
  4. Communication and network security
  5. IAM
  6. Security Assessment and Testing
  7. Security operations
  8. Application development security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Adversarial Artificial Intelligence attack?

A

In this type of attack, threat actors make use of AI and Machine learning to make attacks more effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Supply chain attack?

A

Threat actor finds vulnerabilities in the devices in the supply chain and then other devices in the supply chain gets affected too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Cryptographic attack?

A

It is an attack that affects the secure communication between a client and a server.
For example attacks like - Birthday, Collision, Downgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Advanced Persistent threat (One of the threat actor type)?

A

An APT attacker has expertise in getting unauthorized access to a network, or system and can maintain this unauthorized access for a long time without getting detected.

There is Hactivists as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Security Framework.

A

Security frameworks are the guidelines that security professionals can follow to create security plans to secure organization assets from threats and risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the core component of the security framework?

A
  1. Identifying and documenting security goals
  2. Setting guidelines to achieve security goals
  3. Implementing security processes
  4. Monitoring and communicating results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Security controls?

A

These are the safeguards to protect from specific risks or threats.

17
Q

What is CIA triad?

A

CIA is Confidentiality, Integrity and availability.

18
Q

What is Compliance?

A

It is the process of adhering to internal standards and external regulations.

19
Q

Give me few examples of security frameworks.

A

GDPR (General Data protection regulation), SOC1,2 (System and Organization controls), HIPAA (Health Insurance Portability and Accountability Act),
Payment Card Industry Data Security System (PCI DSS)
Center For Internet Security (CIS)
NIST Cybersecurity framework
NIST Risk Management Framework

20
Q

What is PHI

A

Protected Health Information -

21
Q

What are logs and SEIM tools?

A

Logs are the record of events that occur within an organization.

SEIM tool - It is a tool that can analyze organizational log data and give us the results about different risks, threats within the organization. Ex of such tools are Splunk and Chronicle.

An application that collects and analyzes log data to monitor critical activities in an organization.

22
Q

What is a playbook?

A

These are the operational actions that we can follow in specific situations. For example - a document that tells what to do in case of any security incident happens.

23
Q

What is a packet sniffer?

A

It is also known as Network Protocol Analyzer. It is an application that can capture the network traffic and analyze it.

24
Q

What is SQL?

A

SQL is Structured Query Language - it is a language that we can use to create, interact with or request information from databases.

25
Q

What are the different types of controls that can be implemented?

A

There are 3 types of control -
1. Technical controls - Like Firewalls, IPS, MFAs etc
2. Administrative controls - Separation of duties, Authorization and Asset classification, Password Policies
3. Physical controls - Access cards, Doors, security guards etc

26
Q

Google definition of Security audits.

A

It is the review of organization controls, policies, and procedures against a set of expectations.