CS Flashcards
What is cybersecurity?
-protecting against cyber threats and attacks
Common method used by cybercriminals to trick users into revealing sensitive information
Phishing
Name common cybersecurity threats
- Malware
- Randomware
- Social engineering
What is the first line of defense in cybersecurity
Employee training and awareness
Type of malware locks users out of their systems and demands a ransom to restore access
Ransomware
‘VPN’ stands for in cybersecurity
Virtual private network
Purpose of penetration testing in cybersecurity
Find and fix vulnerabilities in system
Cybersecurity concept involves restricting access to sensitive information only to authorized users
Access control
Cybersecurity protocol ensures that data transmitted between a user’s browser and website s server is secure
HTTPS
Purpose of MFA
Multi-factor authentication
To add an extra layer of security by requiring multiple forms of verification
Cybersecurity practice that involves regularly creating copies of data to prevent data loss in case of cyber incident
Data backup
“Zero day vulnerabilities “ in CS
Vulnerability that has not yet been discovered or patched
Purpose of firewall in CS
Prevent unauthorized access to a network
Most common CS risk associated with using public wi-fi networks
Man in the middle attacks
Main goal of social engineering attacks in CS
To trick individuals into revealing sensitive information
Small piece of code that spreads from one computer to another often causing harm
Worm
Type of attack that floods a target system with excessive traffic to overload and disrupt its operations
DDos attack
Purpose of regular software updates and patches
To fix security vulnerabilities and bugs
“IoT “ stand for
Internet of things
CS measure involves encoding data so that only authorized parties can access and read it
Data encryption
CS practice involves removing all data from a storage device to ensure it cannot be recovered
Data destruction
Person or group of people who carry out cyber attacks for malicious purposes
Black hat hacker cuz hide like punk scared in dark
Primary purpose of CS awareness training for employees
Make employees aware of CS threats and best practices
Practice of regularly reviewing and auditing security measures in place to identify vulnerabilities
Vulnerability assessment
Purpose of virtual machine in CS
To create a secure network for testing software
Practice involves assigning specific permissions and access levels to users based on their roles
Least privilege
Involves breaking up a network into smaller segments to limit the spread of cyber threats
Network segmentation
Purpose of a honeypot in CS
Attract cyber criminals and study their tactics
CS attack that targets a specific individual or organization
Targeted attack
Primary goal of CS
Ensuring data privacy and security
Purpose of a firewall
Filtering network traffic and blocking unauthorized access
“Phishing” refers to in CS
Manipulating people to disclose sensitive information
Which of following is example of a strong password
A) 123456
B) Password123
C) P@ssw0rd
D) Username1234
C)
“Malware” stands for
Malicious software
Purpose of encryption
Hiding sensitive data from attackers
Best practices for handling suspicious emails or messages
Ignoring them and deleting them immediately
CS measure helps protect against software vulnerabilities and bugs
Regular software patching and updates
Practice of tricking individuals into revealing their login credentials or personal information by pretending to be a trustworthy entity
Phishing
MFA
Multi factor authentication
It uses several different types of authentication methods
Attack that floods a network with excessive traffic to disrupt its normal operations
DDoS attack
Distributed denial of service
Purpose of VPN
Virtual private network
Providing secure and private communication over public network
Main goal of red team in CS context
Testing system vulnerabilities and weaknesses
CS principle focuses on limiting user access to only the resources necessary to perform their job functions
Least privilege
Malicious software that restricts access to a computer system or files until a ransom is paid
Ransomware
Involves segmenting a network into smaller zones to contain potential threats and limit their impact
Network isolation
“Social engineering “ refers to
Manipulating people to divulge sensitive information
CS practice involves analyzing and investigating security incidents to identify the cause and extent of a breach
Incident management
CS attack intercepts and modifies communication between two parties without their knowledge
Man in the middle attack
Purpose of a disaster recovery plan in CS
Providing step by step instructions to respond to and recover from a disaster
Best practice for securing passwords
Creating complex and unique passwords for each account
Purpose of security risk assessment in CS
Evaluating security controls and vulnerabilities
Helps prevent unauthorized physical access to sensitive areas of organization
Biometric authentication
Example of CS incident
Unintentional exposure of sensitive information
Primary goal of penetration test in CS
Identifying and fixing security vulnerabilities
Emphasizes use of multiple layers of defense to protect against various threats
Defense in depth
Example of a CS best practice for employees
Reporting suspicious emails or activities to IT or security teams
Primary purpose of a security information and event management (SIEM) system
Analyzing and correlating security events across the network
Example of CS control for data protection
Encryption of sensitive data
CS principle involves not trusting any entity, both inside and outside the organization and continuously verifying access before granting it
Zero Trust
Primary goal of CS
Preventing cyberattacks
Example of social engineering attack
A) brute force attack
B) SQL injection
C) phishing
D) denial of service (DDoS)
C- phishing
What does S stand for in HTTPS
Secure
Purpose of firewall in CS
Prevent unauthorized access to a network
CS attack aims to render a system or network unavailable
DDoS denial of service attack
Best practice for creating strong passwords
Combining uppercase, lowercase letters, numbers and special characters
“Zero day vulnerability “ refers to
Vulnerability that is unknown to the software vendor
Individuals should only have access to resources they need to perform their tasks
Least privilege
Purpose of 2-factor authentication (2FA)
Adding an extra layer of security by requiring two forms of identification
DDoS
Distributed denial of service
Primary purpose of VPN (virtual private network)
Creating a secure and encrypted connection over the internet
Program that spreads from one computer to another without the user s knowledge and interferes with computer operations
Worm
Type of CS attack aims to gain unauthorized access to system by trying different password combinations
Brute force attack
Example of hardware based authentication factor
Biometric fingerprint scanner
Process of converting data into a secret code to prevent unauthorized access
Encryption
What does I stand for in SIEM (security information and event management)
Information
Primary purpose of a honeypot
Collecting threat intelligence
Best practice to protect sensitive data when disposing of old hard drives
Use disk wiping software to overwrite data
Involves updating software and systems with the latest security patches and fixes
Patch management