Chapter 1~5 Short answers Flashcards
short answers
Define cybersecurity.
Cybersecurity is the ongoing effort to protect individuals, organizations, and governments from digital attacks by safeguarding networked systems and data from unauthorized use or harm.
What is the difference between offline and online identity?
Offline identity refers to your real-life persona, including personal details like your name, age, and address. Online identity refers to how you present yourself on the internet, including usernames, aliases, and social profiles.
What are the three dimensions of the Cube security model?
Confidentiality, Integrity, and Availability.
What is identity theft, and why is it dangerous?
Identity theft is when cybercriminals steal personal information to impersonate someone, often for financial gain. It is dangerous because it can lead to fraud, damaged credit, and legal issues.
What are the potential consequences of a data breach for an organization?
Loss of customer trust, financial losses, legal penalties, and damage to the organization’s reputation.
What is ransomware, and how does it work?
Ransomware is a type of malware that encrypts a victim’s data and demands payment (ransom) in exchange for the decryption key.
What is the difference between a DoS and a DDoS attack?
A DoS (Denial-of-Service) attack originates from a single source, while a DDoS (Distributed Denial-of-Service) attack originates from multiple coordinated sources, often using a botnet.
What is social engineering, and give an example.
Social engineering is manipulating people into performing actions or divulging confidential information. An example is phishing, where attackers trick victims into revealing passwords or other sensitive data.
What is a botnet, and how is it used in cyberattacks?
A botnet is a network of infected computers controlled by a hacker. It is used to launch DDoS attacks, distribute malware, or send spam emails.
What is an Advanced Persistent Threat (APT)?
An APT is a long-term, targeted cyberattack carried out by highly skilled and well-funded attackers, often for espionage or sabotage.
What is encryption, and why is it important?
Encryption is the process of converting information into a form that unauthorized parties cannot read. It is important because it protects sensitive data from being accessed by hackers.
What is the difference between a password and a passphrase?
A password is typically a short string of characters, while a passphrase is a longer sentence or phrase that is easier to remember but harder to crack.
What are the risks of using public Wi-Fi?
Public Wi-Fi is often unsecured, making it easy for hackers to intercept data, such as passwords or credit card information.
What is WPA2, and why is it important for wireless security?
WPA2 (Wi-Fi Protected Access 2) is a security protocol that encrypts wireless communication. It is important because it helps protect data from being intercepted by unauthorized users.
What is the purpose of a VPN?
A VPN (Virtual Private Network) encrypts internet traffic, providing secure access to a network and protecting data from being intercepted by hackers.
What is the primary function of a firewall?
A firewall filters network traffic and blocks malicious behavior, protecting the network from unauthorized access.
What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a public key to encrypt and a private key to decrypt.
What is multi-factor authentication (MFA)?
MFA requires users to provide two or more forms of verification (e.g., password and fingerprint) to access a system, adding an extra layer of security.
What is the purpose of an Intrusion Prevention System (IPS)?
An IPS monitors network traffic for malicious activity and blocks it based on predefined signatures or rules.
What are the three types of access control?
Physical, Logical, and Administrative.
What is a hashing algorithm, and what is its purpose?
A hashing algorithm is a mathematical function that converts data into a fixed-length hash value. Its purpose is to ensure data integrity by detecting any changes to the original data.
What is the “Five Nines” concept in high availability?
“Five Nines” refers to a system availability of 99.999%, meaning the system is operational 99.999% of the time with minimal downtime.
What is RAID, and why is it used?
RAID (Redundant Array of Independent Disks) combines multiple hard drives into a single logical unit to provide data redundancy and improve performance.
What is the difference between synchronous and asynchronous replication?
Synchronous replication updates data in real-time across locations, while asynchronous replication updates data with a slight delay.
What is a single point of failure, and how can it be mitigated?
A single point of failure is a component whose failure can disrupt an entire system. It can be mitigated by adding redundancy or backup systems.