Computer Security Flashcards
What is cyber security?
Cybersecurity is a set of processes, best practices, and technology solutions that help protect your critical systems and network from digital attacks.
What is a cybersecurity threat?
A cybersecurity threat is a deliberate attempt to gain access to an individual’s or organization’s system.
Why do bad actors evolve their attack methods?
Bad actors continuously evolve their attack methods to evade detection and exploit new vulnerabilities.
What are some of the common methods that are used in cyber attacks?
- Malware
- Ransom ware
- Social Engineering
- Phishing
- Insider threats
- Advanced persistent threats
What do attackers often do during a ransomware attack?
Attackers often extract data during a ransomware attack and may threaten to publish it if they don’t receive payment.
What do attackers require victims to do in a ransomware attack?
In exchange for a decryption key, victims must pay a ransom, typically in cryptocurrency. Not all decryption keys work, so payment does not guarantee that the files will be recovered.
What is social engineering?
In social engineering, attackers take advantage of people’s trust to dupe them into handing over account information or downloading malware.
How do bad actors in social engineering attacks masquerade themselves?
In these attacks, bad actors masquerade as a known brand, coworker, or friend and use psychological techniques such as creating a sense of urgency to get people to do what they want.
What is phishing?
Phishing is a type of social engineering that uses emails, text messages, or voicemails that appear to be from a reputable source to convince people to give up sensitive information or click on an unfamiliar link.
What is malware? (Examples: wrsv)
Malware is a catchall term for any malicious software, including worms, ransomware, spyware, and viruses.
What is the purpose of malware? (a or d, ex, s or t)
Malware is designed to cause harm to computers or networks by altering or deleting files, extracting sensitive data like passwords and account numbers, or sending malicious emails or traffic.
How can malware be installed?
Malware may be installed by an attacker who gains access to the network, but often, individuals unwittingly deploy malware on their devices or company network after clicking on a bad link or downloading an infected attachment.
What is the importance of cybersecurity?
Cybersecurity enables productivity and innovation by giving people the confidence to work and socialize online. The right solutions and processes allow businesses and governments to take advantage of technology to improve how they communicate and deliver services without increasing the risk of attack.
What are the four cybersecurity best practices? (ACii)
- Adopt a Zero Trust security strategy
- Conduct regular cyber security training
- Institute cybersecurity processes
- Invest in comprehensive solutions
How are identities safeguarded? (PrEnBoU)
- Prevent identity attacks
- Ensure least-privilege access.
- Boost efficiency
- Unify access controls