CS Flashcards
What is cybersecurity?
-protecting against cyber threats and attacks
Common method used by cybercriminals to trick users into revealing sensitive information
Phishing
Name common cybersecurity threats
- Malware
- Randomware
- Social engineering
What is the first line of defense in cybersecurity
Employee training and awareness
Type of malware locks users out of their systems and demands a ransom to restore access
Ransomware
‘VPN’ stands for in cybersecurity
Virtual private network
Purpose of penetration testing in cybersecurity
Find and fix vulnerabilities in system
Cybersecurity concept involves restricting access to sensitive information only to authorized users
Access control
Cybersecurity protocol ensures that data transmitted between a user’s browser and website s server is secure
HTTPS
Purpose of MFA
Multi-factor authentication
To add an extra layer of security by requiring multiple forms of verification
Cybersecurity practice that involves regularly creating copies of data to prevent data loss in case of cyber incident
Data backup
“Zero day vulnerabilities “ in CS
Vulnerability that has not yet been discovered or patched
Purpose of firewall in CS
Prevent unauthorized access to a network
Most common CS risk associated with using public wi-fi networks
Man in the middle attacks
Main goal of social engineering attacks in CS
To trick individuals into revealing sensitive information
Small piece of code that spreads from one computer to another often causing harm
Worm
Type of attack that floods a target system with excessive traffic to overload and disrupt its operations
DDos attack
Purpose of regular software updates and patches
To fix security vulnerabilities and bugs
“IoT “ stand for
Internet of things
CS measure involves encoding data so that only authorized parties can access and read it
Data encryption
CS practice involves removing all data from a storage device to ensure it cannot be recovered
Data destruction
Person or group of people who carry out cyber attacks for malicious purposes
Black hat hacker cuz hide like punk scared in dark
Primary purpose of CS awareness training for employees
Make employees aware of CS threats and best practices
Practice of regularly reviewing and auditing security measures in place to identify vulnerabilities
Vulnerability assessment
Purpose of virtual machine in CS
To create a secure network for testing software
Practice involves assigning specific permissions and access levels to users based on their roles
Least privilege
Involves breaking up a network into smaller segments to limit the spread of cyber threats
Network segmentation
Purpose of a honeypot in CS
Attract cyber criminals and study their tactics
CS attack that targets a specific individual or organization
Targeted attack
Primary goal of CS
Ensuring data privacy and security
Purpose of a firewall
Filtering network traffic and blocking unauthorized access
“Phishing” refers to in CS
Manipulating people to disclose sensitive information
Which of following is example of a strong password
A) 123456
B) Password123
C) P@ssw0rd
D) Username1234
C)
“Malware” stands for
Malicious software
Purpose of encryption
Hiding sensitive data from attackers
Best practices for handling suspicious emails or messages
Ignoring them and deleting them immediately
CS measure helps protect against software vulnerabilities and bugs
Regular software patching and updates
Practice of tricking individuals into revealing their login credentials or personal information by pretending to be a trustworthy entity
Phishing
MFA
Multi factor authentication
It uses several different types of authentication methods
Attack that floods a network with excessive traffic to disrupt its normal operations
DDoS attack
Distributed denial of service
Purpose of VPN
Virtual private network
Providing secure and private communication over public network
Main goal of red team in CS context
Testing system vulnerabilities and weaknesses
CS principle focuses on limiting user access to only the resources necessary to perform their job functions
Least privilege
Malicious software that restricts access to a computer system or files until a ransom is paid
Ransomware
Involves segmenting a network into smaller zones to contain potential threats and limit their impact
Network isolation
“Social engineering “ refers to
Manipulating people to divulge sensitive information
CS practice involves analyzing and investigating security incidents to identify the cause and extent of a breach
Incident management
CS attack intercepts and modifies communication between two parties without their knowledge
Man in the middle attack
Purpose of a disaster recovery plan in CS
Providing step by step instructions to respond to and recover from a disaster
Best practice for securing passwords
Creating complex and unique passwords for each account
Purpose of security risk assessment in CS
Evaluating security controls and vulnerabilities
Helps prevent unauthorized physical access to sensitive areas of organization
Biometric authentication
Example of CS incident
Unintentional exposure of sensitive information
Primary goal of penetration test in CS
Identifying and fixing security vulnerabilities
Emphasizes use of multiple layers of defense to protect against various threats
Defense in depth
Example of a CS best practice for employees
Reporting suspicious emails or activities to IT or security teams
Primary purpose of a security information and event management (SIEM) system
Analyzing and correlating security events across the network
Example of CS control for data protection
Encryption of sensitive data
CS principle involves not trusting any entity, both inside and outside the organization and continuously verifying access before granting it
Zero Trust
Primary goal of CS
Preventing cyberattacks
Example of social engineering attack
A) brute force attack
B) SQL injection
C) phishing
D) denial of service (DDoS)
C- phishing
What does S stand for in HTTPS
Secure
Purpose of firewall in CS
Prevent unauthorized access to a network
CS attack aims to render a system or network unavailable
DDoS denial of service attack
Best practice for creating strong passwords
Combining uppercase, lowercase letters, numbers and special characters
“Zero day vulnerability “ refers to
Vulnerability that is unknown to the software vendor
Individuals should only have access to resources they need to perform their tasks
Least privilege
Purpose of 2-factor authentication (2FA)
Adding an extra layer of security by requiring two forms of identification
DDoS
Distributed denial of service
Primary purpose of VPN (virtual private network)
Creating a secure and encrypted connection over the internet
Program that spreads from one computer to another without the user s knowledge and interferes with computer operations
Worm
Type of CS attack aims to gain unauthorized access to system by trying different password combinations
Brute force attack
Example of hardware based authentication factor
Biometric fingerprint scanner
Process of converting data into a secret code to prevent unauthorized access
Encryption
What does I stand for in SIEM (security information and event management)
Information
Primary purpose of a honeypot
Collecting threat intelligence
Best practice to protect sensitive data when disposing of old hard drives
Use disk wiping software to overwrite data
Involves updating software and systems with the latest security patches and fixes
Patch management
Emphasizes use of multiple layers of security controls to protect against various attack vectors
Defense in depth
C stand for in CIA triad
Confidentiality integrity availability
Continuity
Attacker masquerades as a trusted entity to deceive individuals or gain unauthorized access
Phishing
Ransomware attack
Blocking access to a computer system until a ransom (or set fee) is paid
Categorizing data based on its sensitivity and criticality
Data classification
Purpose os Security Operations Center (SOC) in CS
Investigating and responding to security incidents
Malware disguises itself as legitimate but performs malicious activities in background
Spyware
Main purpose of incident response plan in CS
Responding effectively to security incidents
Principle emphasizes importance of verifying the identity of users before granting them access to resources
User authentication
Attack that intercepts and alters communication between two parties without their knowledge
Man in the middle attack (MitM)
Primary goal of CS
To prevent unauthorized access and protect sensitive data
Common example of social engineering
Sending phish emails to trick users into revealing their passwords
Process of converting plaintext into unreadable ciphertext to protect sensitive data
Encryption
Security principle emphasizes idea of using multiple layers of security controls
Defense in depth
Security testing method involves simulating real world attacks to identify vulnerabilities
Penetration testing
Main purpose of firewall in network security
Prevent unauthorized access to the network
“Phishing”
Sending deceptive emails to trick users into revealing sensitive information
Purpose of “intrusion detection system “
To detect and respond to suspicious activities or security breaches
Security control involves hiding complex technical details to simplify security management
Abstraction
Process of evaluating and prioritizing security vulnerabilities in a system or network
Vulnerability assessment
Encryption key management practice protects encryption keys from unauthorized access
Key protection
Security principle suggests that security mechanisms should not rely solely on secrecy
Open design
Purpose of a VPN
Virtual private network
Provide secure remote access to the network
What does C stand for in CIA Triad , a fundamental concept of information security
Confidentiality
Security testing method involves analyzing the source code of an application to identify security vulnerabilities
Security code review
Purpose of a security incident response plan
To provide guidelines for responding to and managing security incidents
Security control aims to limit the impact of a security breach by dividing a system into smaller, isolated components
Compartamentalizing
Primary goal of security risk assessment
Identify and prioritize security risks based on their potential impact
Prevent unauthorized users from accessing a specific resource
Authorization
Security testing method involves sending unexpected and random inputs to an application to identify vulnerabilities
Fuzz testing (fuzzing)
Purpose of implementing data loss prevention (DLP) solutions
To monitor and protect sensitive data from unauthorized transmission
Primary goal of security compliance assessments
Verify whether security practices comply with industry regulations and standards
Security control that ensures access to resources is validated and authorized every time it is requested
Complete mediation
Purpose of a security incident response team (SIRT)
To coordinate and respond to security incidents
Security control aims to simplify security mechanisms and avoid unnecessary complexity
Least common mechanism
Security principle involves ensuring that users are not surprised or confused by system behavior
Least astonishment
CS attack is disguised as a trustworthy entity to steal sensitive information
Phishing
Authentication factor involves physical chrcs like fingerprints
Something you are
Best practice to protect sensitive data when it is not in use
Encryption at rest
CS term refers to software that disguises itself as a legitimate program but is malicious
Trojan horse
CS concept involves assigning access rights based on predefined roles
Role based access control (RBAC)
CS attack that exploits weak passwords to gain unauthorized access to system
Brute force attack
First step in CS incident response team
Identification
CS concept involves tricking users into revealing sensitive info through psy manipulation
Social engineering
CS concept involves securely disposing of old computer hardware to prevent data breaches
Secure disposal of assets
CS practice of hiding sensitive data in image or another file format
Stenography
CS measure involves using predefined rules to block or allow network traffic
Firewall
Process of identifying and addressing potential vulnerabilities in a system or application
Penetration testing
Purpose of Honeypot
Luring hackers into a controlled environment to monitor their activities
Analyzing and responding to security events and incidents
Incident response
Monitoring network traffic for suspicious activities or anomalies
Intrusion detection system (IDS)
Primary goal of distributed denial of service DDoS attack
Disrupt or shut down a service or website
Process of capturing and analyzing network traffic to detect and prevent threats
Packet sniffing
Security mechanism can prevent unauthorized access to a network by acting as a barrier between internal and external networks
Firewall
Purpose of penetration test
Identify vulnerabilities in the network
CS attack involves manipulating individuals into revealing sensitive information
Phishing attack
SIEM stand for
Security information and event management
Cs measure helps prevent unauthorized data disclosure by monitoring and blocking transmission of sensitive information
Data loss prevention (DLP)
“Zero trust”
Do not trust any user or device by default
Type of social engineering attack that relies on urgent and alarming messages to trick users into taking immediate action
Baiting
Main goal of threat hunting
Investigating and proactively searching for hidden threats
Dividing network into smaller, isolated segments to limit the impact act of a security breach
Network segmentation
CS mechanism uses automated tools to scan for known vulnerabilities in systems and networks
Vulnerability scanning
Attackers attempt to guess passwords by trying all possible combinations
Brute force attack
Purpose of honeypot in CS
Attracting and trapping attackers
Example of two factor authentication
Using a password and pin to log in
“UEBA” stand for
User and entity behavior analytics
Primary purpose of a web Application Firewall (WAF)
Blocking malicious web traffic and attacks
CS measure aims to prevent unauthorized access by granting users access based on their roles and responsibilities
Access controls
Type of malware that spreads through networks without user interaction
Worm
CSRF stands for
Cross site request forgery
Security principle assumes that both internal and external networks are potentially compromised, and access should be strictly authenticated and verified
Zero trust
Primary purpose of a network intrusion detection system (NIDS)
Monitoring network traffic for suspicious activities
CS mechanism involves recording keystrokes to capture sensitive information such as passwords and credit card details
Keylogging
CS attack involves redirecting website traffic to a fraudulent website to steal sensitive information
Pharming attack
Primary purpose of bug bounty programs in CS
Encouraging security researchers to find and report vulnerabilities
CS framework provides guidelines and best practices for securing information systems and networks
NIST cybersecurity framework
Encryption algorithm is commonly used for securing data and passwords
AES
Security vulnerability that allows an attacker to inject malicious code into web application s database
Cross site scripting (XSS)
Involves sending deceptive emails to trick recipients into revealing sensitive information or clicking on malicious links
Phishing attack
Encryption algorithm uses a pair of keys : public key for encryption and private key for decryption
RSA
Cybersecurity framework provides guidelines and best practices for securing information systems and networks
NIST cybersecurity framework
Encryption algorithm is commonly used for securing data and passwords
AES
Term for malicious software that disguises itself as legitimate software to trick users
Trojan
CS concept involves ensuring data remains unchanged and can be verified as genuine
Integrity
CS concept involves redundant protective measures to secure organization s assets
Defense in depth
CS term refers to code based attack that spreads through infected files and software
Virus
Involves hiding internal IP addresses from external networks
NAT ( network address translation)
CVE stand for
Common vulnerabilities and exposures
HTTPS indicate in a website URL
Hypertext transfer protocol secure
CS attack involves exploiting software vulnerabilities to gain unauthorized access
Exploit attack
Best practice for securely disposing of sensitive documents or data
Shredding the physical documents and using secure data deletion for digital files
Primary goal of CS
Minimize the impact of cyber threats
C stand for in CIA triad
Confidentiality
Type of malware spread by attaching itself to other programs
Worm
CS technology inspects network traffic to block malicious content and unauthorized access
Firewall
A stand for in theCIA triad
Availability
CS practice involves separating network segments to limit spread of a cyber attack
Defense in depth
CS regulation is aimed at protecting privacy of personal data for EU citizens
GDPR
CS regulation is aimed at protecting the privacy of personal health information
HIPAA
CS principle focuses on limiting the impact of a security breach as it occurs
Incident response
CS regulation is aimed at protecting consumers financial information
GLBA
CS technology monitors and analyzes network traffic for suspicious behavior
Intrusion detection system (IDS)
CS regulation is aimed at protecting personal data of California residents
CCPA
CS principle ensures data is accurate and trustworthy
Integrity
Main goal of intrusion detection system
Monitor network activity for suspicious behavior
Cs technology scans and analyzes files for known malware signatures
Antivirus software
CS attack involves sending unauthorized commands to a web applications database through input fields
SQL injection attack
Practice of tricking individuals into revealing their passwords by pretending to be a Legitimate entity
Social engineering
CS protocol encrypts data transmission over a network connection
HTPPS
VPN stand for
Virtual private network
CS principle ensures that data is accessible and usable when needed
Availability
CS defense mechanism uses heuristics and behavior analysis to detect new and unknown threats
Antivirus software
CS attack involves redirecting users to a fake website that mimics legitimate one to steal their login credentials
Pharming attacks
Primary role of security operations center (SOC)
Monitor network traffic and security alerts
Piece of code or software designed to exploit a vulnerability in system
Malware
Ca principle ensures that data is only accessible to authorized individuals or systems
Confidentiality
Practice of securing software applications against security vulnerabilities during development
Secure coding
Ca measure protects network by filtering and blocking incoming and outgoing traffic based on predefined rules
Firewall