Course 1 and 2 Flashcards
What are the primary responsibilities of an entry-level security analyst?
Monitor Systems
Protect Information
Search for Weaknesses
Performing ___ enables security professionals to review an organization’s security records, activities, and related documents.
security audits.
________ identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.
Digital Forensic Investigators.
The purpose of ______ is to protect networks, devices, people, and data from unauthorized access or criminal exploitation.
cybersecurity
What occurs during a security audit?
Review of an organization’s security records, activities, and other related documents.
An employee receives an email that they believe to be legitimate. They click on ac compromised link within the email. What type of internal threat does this scenario describe?
Accidental
What is identity theft?
Stealing personal information to commit fraud while impersonating a victim.
Security _____ and event management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.
Information
What is SIEM? Describe.
Security Information and Event Management.
SIEM enables security professionals to identify and analyze threats, risks, and vulnerabilities.
A security professional investigates an alert about an unknown user accessing a system within their organization. What is the purpose of computer forensics in this situation?
Identify, analyze, and preserve criminal evidence.
What was the Brain Virus?
A virus invented by the Alvi brothers. The intention was to track illegal copies of medical software and prevent pirated licenses.
Unintentionally, the virus would copy itself onto any disk inserted into the infected PC and this spread globally in a few months significantly affecting the global business industry.
What was the Morris worm?
1988, developed by Robert Morris. Intent was a program to assess the size of the internet. The program crawled the web and installed itself onto other computers to tally the number of computers that were connected to the internet.
The program failed to keep track of the computers and had already compromised and continued to re-install itself until the computers ran out of memory and crashed. About 6,000 computers were affected, representing 10% of the internet at the time.
What are CERTs?
Computer Emergency Response Teams established to respond to computer security incidents.
What is LoveLetter?
Created by One De Guzman in 2000.
Malware to steal internet login credentials. Users received an email with the subject line, “I Love You.” Each email contained an attachment labeled, “Love Letter For You.” When the attachment was opened, the malware scanned a user’s address book. Then, it automatically sent itself to each person on the list and installed a program to collect user information and passwords.
This was the first example of social engineering.
What are CSIRTs?
Computer Security Incident Response Team.