Chapter 1 Flashcards

1
Q

Asset

A

property that belongs to an individual, organization, company, etc. A bank’s asset is its money; programming code is a software company’s asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat

A

the possibility of being a cyberattack target. Every organization and individual can be threatened by cyber-attacks for a variety of reasons, such as competition, politics, revenge, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk

A

the potential damage to an individual or organization that exists due to a lack of security or awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

weakness that can pose risks. Systems, software, hardware, and other elements that are not configured properly may have vulnerabilities that can be exploited for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploitation

A

taking advantage of vulnerabilities to gain access to and control over a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall

A

software that inspects, detects, and blocks traffic based on policies and parameters (IP, port, etc.). It can also be a physical device with the same purpose but is capable of handling a higher volume of network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Antivirus

A

software that inspects, detects, and removes malicious programs. There are many types of antivirus applications, but all have the same basic purpose. Each application incorporates different technologies to accomplish the task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The CIA Triad

A

Confidentiality
Integrity
Availability
key to keeping information protected from potential leaks, changes, or other types of harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware

A

software designed for malicious purposes, or malicious software. It can be hidden in a computer program, a piece of code, and even embedded in hardware. malicious software created with the purpose of causing damage or exploiting any device, including computers, routers/switches, servers, and IoT devices. Some examples of malware are trojans, viruses, worms, ransomware, and spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus

A

Self-replicating software that targets systems in a computer and attaches itself to them upon execution. As a virus spreads across a computer, it may corrupt or destroy data and cause a lot of damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worm

A

Similar to a virus, a worm self-replicates, but does not require user intervention for it to be executed. It can spread to other computers, typically over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan Horse

A

Code that masquerades as a legitimate program but causes a lot of damage when executed. Trojan horses do not self-replicate like worms or viruses. They can, however, create backdoors in systems, or use system resources for various purposes, such as crypto mining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

Malware that attempts to harvest information from a computer. The possibly confidential information is copied to the attacker’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

The malware encrypts computer files and prevents them from being accessed or restored. Widely used for financial purposes, including demands for payment in return for decrypting the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social Engineering

A

Art used to reveal vulnerabilities related to human action or obtain important information. By observing human behavior, hobbies, and social activities, a lot of information can be gathered and used for both malicious purposes and security assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DoS

A

A Denial of Service (DoS) attack disables a service by overwhelming it with requests. This type of attack is no longer as practical as in past years, due to the more powerful ability of computers today to handle larger volumes of requests.

17
Q

DDoS

A

Distributed Denial of Service (DDoS) is similar to DoS but is initiated from multiple stations simultaneously. This type of attack remains a current threat to services.

18
Q

The Morris Worm

A

This was the very first computer worm, which was created as an experiment in 1988 and managed to spread across the internet. The worm spread to computers and replicated several times, with each replication causing the entire system to slow down until it could not be used at all. Although its purpose was not malicious, and the intention was to highlight a potential security flaw, it nonetheless ended up causing extensive damage to many computers and networks.

19
Q

Elk Cloner

A

One of the first viruses was written in 1982 by a 15-year-old student. It spread to personal computers via a floppy disk that hosted a game. After the game was used a number of times, the virus was executed and ran a poem about the virus.