Computer Security Flashcards

1
Q

What is cyber security?

A

Cybersecurity is a set of processes, best practices, and technology solutions that help protect your critical systems and network from digital attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a cybersecurity threat?

A

A cybersecurity threat is a deliberate attempt to gain access to an individual’s or organization’s system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do bad actors evolve their attack methods?

A

Bad actors continuously evolve their attack methods to evade detection and exploit new vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some of the common methods that are used in cyber attacks?

A
  1. Malware
  2. Ransom ware
  3. Social Engineering
  4. Phishing
  5. Insider threats
  6. Advanced persistent threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do attackers often do during a ransomware attack?

A

Attackers often extract data during a ransomware attack and may threaten to publish it if they don’t receive payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do attackers require victims to do in a ransomware attack?

A

In exchange for a decryption key, victims must pay a ransom, typically in cryptocurrency. Not all decryption keys work, so payment does not guarantee that the files will be recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is social engineering?

A

In social engineering, attackers take advantage of people’s trust to dupe them into handing over account information or downloading malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do bad actors in social engineering attacks masquerade themselves?

A

In these attacks, bad actors masquerade as a known brand, coworker, or friend and use psychological techniques such as creating a sense of urgency to get people to do what they want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

Phishing is a type of social engineering that uses emails, text messages, or voicemails that appear to be from a reputable source to convince people to give up sensitive information or click on an unfamiliar link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is malware? (Examples: wrsv)

A

Malware is a catchall term for any malicious software, including worms, ransomware, spyware, and viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of malware? (a or d, ex, s or t)

A

Malware is designed to cause harm to computers or networks by altering or deleting files, extracting sensitive data like passwords and account numbers, or sending malicious emails or traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can malware be installed?

A

Malware may be installed by an attacker who gains access to the network, but often, individuals unwittingly deploy malware on their devices or company network after clicking on a bad link or downloading an infected attachment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the importance of cybersecurity?

A

Cybersecurity enables productivity and innovation by giving people the confidence to work and socialize online. The right solutions and processes allow businesses and governments to take advantage of technology to improve how they communicate and deliver services without increasing the risk of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four cybersecurity best practices? (ACii)

A
  1. Adopt a Zero Trust security strategy
  2. Conduct regular cyber security training
  3. Institute cybersecurity processes
  4. Invest in comprehensive solutions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How are identities safeguarded? (PrEnBoU)

A
  1. Prevent identity attacks
  2. Ensure least-privilege access.
  3. Boost efficiency
  4. Unify access controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SIEM?

A

SIEM Defined

Security information and event management, SIEM for short, is a solution that helps organizations detect, analyze, and respond to security threats before they harm business operations.

17
Q

What is SIEM in full?

A

Security Information Event Management system.

18
Q

What does SIEM technology do? (c, i, t)

A

SIEM technology collects event log data from a range of sources, identifies activity that deviates from the norm with real-time analysis, and takes appropriate action.

19
Q

What is a computer virus?

A

Is a type of malware that replicates by inserting a copy of its executable code into other applications, operating-system files, data files, or hardware components.

20
Q

What are computer worms?

A

Computer worms are a special form of malware that replicate without direct intervention and spread across networks to infect other computers.

Additional information: Worms can infect other computers on a network without requiring a user to open an email attachment or file.

21
Q

What is a Trojan horse?

A

A type of malware that provides an attacker with remote access to the infected computer.

22
Q

What is ransomware?

A

Ransomware is a kind of malware that encrypts user data, and the data can only be recovered by paying a ransom to the authors.

23
Q

What is spyware?

A

A type of malware that tracks how a computer is used without the user’s consent.

24
Q

List the types of malware

A
  1. Computer viruses
  2. Computer worms
  3. Ransomware
  4. Spyware
  5. Trojan Horses
25
Q

What are some of the tricks that cybersecurity criminals use in phishing attacks.

A
  1. Fake websites
  2. Threats
  3. Spoofing companies or people you know