Cyber Flashcards

1
Q

Define the internet

A

Globally connected communications network over which devices send and receive data, communicating and accessing data resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify types of equipment that make up the internet

A

Networking hardware that routes traffic
Physical cabling
Radio transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does not make up the internet?

A

User devices
Smart devices
Data servers
The data itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

World Wide Web definition

A

The interconnected system of public webpages that are accessible thru the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Come up with an example of a Uniform Resource Locator (URL)

A

Domain name + elements after that identify the specific location on that domain (www.whatever/something.com)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What percent of overall content can be accessed over the internet that’s on the WWW?

A

4%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List characteristics of the Deep Web (3)

A

Access controlled portion of the internet
Requires some type of user authentication to access
Info is private and cannot be found with a search engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of info on the deep web

A

Anything that is private info (banking, medical) as opposed to a shopping website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What percent of overall content that can be accessed over the internet that is on the deep web?

A

90%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List characteristics of the dark web (4)

A

Hides both the content and identity of the user trying to access it
Set of websites intentionally hidden from the public
Can only be accessed using a special browser
Cannot use a regular search engine to find websites there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s the name of the network that controls the dark web?

A

The onion network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What percent of overall content can be accessed on the dark web?

A

6%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition of confidentiality as it relates to the cia triad

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Definition of integrity as it relates to the cia triad

A

Maintaining the consistency, accuracy, and trustworthiness of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Definition of availability as it relates to the cia triad

A

Ensuring systems can be accessed when requested by authorized and authenticated users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Definition of authentication as it relates to info assurance

A

Verification of a users credential to confirm identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Definition of authorization as it relates to info assurance

A

Verification of an authenticated users permissions to access a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Definition of non-repudiation as it relates to info assurance

A

Assurance that the sender of info received proof of delivery and the recipient is provided with proof of the senders identity so neither can later deny they processed the info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List the 2 basic steps in the risk management process

A

Identify and prioritize all potential risks
Determine how the organization with deal with each potential risk

20
Q

Identify aspects of risk that are evaluated (3)

A

The ASSETS you want to protect
The VULNERABILITIES each asset has that can be exploited by a specific threat
The potential THREATS that could exploit a vulnerability

21
Q

Definition of asset

A

Thing of value or something we care about that we are trying to protect

22
Q

Definition of critical infrastructure

A

Physical and cyber systems and assets that are considered essential services that are vital to American society

23
Q

How many sectors in the US are considered critical infrastructure

A

16

24
Q

Vulnerability definition

A

Weakness in an organizations info system, security system, internal controls, or implementation

25
Q

List the categories of vulnerabilities (3)

A

Weakness in a system
Flaw in the program
Absence or weakened of safeguards

26
Q

Zero day attack definition

A

Attack that exploits a vulnerability that a software developer may not have been aware of prior to the attack

27
Q

White hat hacker

A

Hacker who legally has permission to try and hack a system

28
Q

Penetration testing

A

Hackers hired to test an organizations networks for vulnerabilities

29
Q

Bug bounty

A

Reward offered by an organization to someone who finds and tells that about flaws or vulnerabilities in its system

30
Q

Gray hat hacker (permission to hack? Legal?)

A

No permission and illegal

31
Q

Cyber criminal

A

Black hat hacker whose primary motivation is to make money by stealing sensitive company info or personal data

32
Q

List possible categories of disgruntled insiders (3)

A

Current employee
Former employee
Third party vendors who have access to the network

33
Q

Hacktivist

A

Black hat hacker whose goal is to further social or political end

34
Q

Corporate spy

A

Black hat hacker whose goal is to conduct industrial espionage to steal trade secrets from competitors

35
Q

What black hat hacker poses the highest risk due to their ability to effectively employ tech against the most difficult targets

A

Hostile nation-state

36
Q

List cyberattacks conducted by terrorist organizations (3)

A

Stealing sensitive, secret info, that they use to terrorize personnel
Attacks in critical infrastructure
Attacks against military weaponry

37
Q

White hat hacker

A

Legal hacker

38
Q

Scenario of data at rest

A

Data in storage on some device and is not being hsef

39
Q

Scenario based on data in transit

A

Data being communicated between a sender and a receiver over a network and or internet

40
Q

Scenario based on data at use

A

Data being processed and currently in the devices memory

41
Q

Scenarios of pen testing, grey hat hacking, hacktivist, cyber criminal, corporate spy

A

Idk list them

42
Q

Risk avoidance

A

Choosing not to perform an activity that may carry risk

43
Q

Risk mitigation

A

Actions taken to reduce the likelihood or overall impact of risk occurring

44
Q

Risk transfer

A

Getting and insurance policy that would pay money to cover financial losses due to risk occurrence

45
Q

Risk acceptance

A

Retaining some risks that you feel are unlikely to occur and or the possible impact is acceptable to your organization

46
Q

Scenarios showing risk avoidance, risk mitigation, risk transfer, risk acceptance

A

Better know them