Basics and Fundamentals Flashcards

1
Q

What is the act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction?

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the act of protecting the systems that hold and process our critical data?

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 parts of the CIA triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is it to have information that has not been disclosed to unauthorized people?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is it to have information that has not been modified or altered without proper authorization?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is it to have information that is able to be stored, accessed, or protected at all times?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the AAA’s of security?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a person’s identity is established with proof and confirmed by a system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Occurs when a user is given access to a certain piece of data or certain areas of a building.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tracking of data, computer usage, and network resources.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the ways a person’s identity is established?

A
Something you know.
Something you are.
Something you have.
Something you do.
Somewhere you are.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the major security threat types?

A

Malware
Unauthorized Access
System Failure
Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Short for malicious software.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occurs when access to computer resources and data occurs without the consent of the owner.

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Occurs when a computer crashes or an individual application fails.

A

System Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The act of manipulating a user into revealing confidential information or performing other detrimental actions.

A

Social Engineering

17
Q

What are 3 ways to mitigate threats?

A

Physical, technical and administrative controls

18
Q

Alarm systems, locks, surveillance cameras, identification cards, and security guards.

A

Physical Controls

19
Q

Smart cards, encryption, access control lists (ACLs), intrusion detection systems, and network authentication.

A

Technical Controls

20
Q

Policies, procedure, security awareness training, contingency planning, and disaster recovery plans.

A

Administrative Controls

21
Q

What is the most cost-effective administrative security control to use?

A

User training

22
Q

What are the 5 types of hackers?

A

White, Black, Gray, and Blue Hats, Script Kiddies

23
Q

A non-malicious hacker who attempts to break into a company’s systems at their request.

24
Q

A malicious hacker who breaks into a company’s computer systems and network without authorization or permission.

25
A hacker without any affiliation to a company who attempts to break into a company's network, but risk the law by doing so
Gray Hat
26
A hacker who attempts to hack into a network with permission of the company but are not employed by the company.
Blue Hat
27
Hackers who find and exploit vulnerabilities before anyone else does.
Elite Hacker
28
Hackers with limited skills who only use other people's exploits and tools.
Script Kiddies
29
What are 4 types of threat actors in order of lowest to highest skill level?
Script Kiddies Hacktivists Organized Crime Advanced Persistent Threats
30
Hackers who are driven by a cause like social change, political agendas, or terrorism.
Hacktivists
31
Hackers who are part of a crime group that is well-funded and highly sophisticated.
Organized Crime
32
Highly trained and funded groups of hackers, often employed by nation states, with covert and open-source intelligence at their disposal.
Advanced Persistent Threats