CYBER 160 Module 1~ Introduction to Security Flashcards

1
Q

tasks of securing digital information, whether manipulated by micro processor (personal computer) or a storage device or transmitted over a network

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 protections over information (CIA)

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

individual or entity responsible for cyber incidents against the technology equipment of enterprises and users

A

threat actor or malicious actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

attacker who violates computer security for personal gain

Ex: steal credit card numbers or inflicts mailicous damage (corrupts a hard drive)

A

black hat hacker

type of hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attackers that study’s a system with the organization permission for weakness and privately provides that information to the organization

A

white hat hackers

type of hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attacker who attempts to break into a computer system without an organizations permission to publically disclose the attack and shame the organization into taking action

A

gray hat hackers

type of hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

individual who wants to perform attacks, yet lack the technical knowledge to carry them out

A

script kiddes

type of threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attacker strongly motivated by beliefs or principles

A

Hactivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

government sponsored attackers who launch cyber attacks against the foes of the states

A

state actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

class of attacks that uses innovative attack tools to affect and silently extract data over an extended period of time

A

Advanced persistent threat (APT)

most commonly associated with state actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attacker that manipultaes data from a position of a trusted employee

A

Insider threat

Ex: healthcare worker passed on for a promotion might sell celebrity health care records to the media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

threat actor who moved from traditional criminal activiries to more rewarding and less risky online attacks

A

cryminal sindicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a system that consists of the hardware device and operating system that runs software such as application programs or processes

A

platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

platform thats no longer in widespread use because its been replaced by an updated version of the eearlier technology

A

legacy platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

software and technology located with in the physical confines of an enterprise which is usually stronger in the company’s data center

A

on-premises platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

pay per use computing model in which customer pay for the resources they need

A

cloud platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

configuration settings that aren’t properly implemented, resulting, invulnerabilities

A

weak configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

default settings set by vendor for usability and ease and not for security

A

default settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

unprotected account that gives unrestricted access to all resources

A

unsecure root accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

user access over files that should have been restricted

A

open permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

using protocols for telecommunicatioin that don’t provide adequate protection

A

insecure or unsecure protocols

22
Q

external entities outside of the organization

A

third parties

Ex: marketing agencies,landscapers, attorneys

23
Q

contracting with the third parties to assist organizations in developtment and writing of software programs

A

outsourced code development

24
Q

third party facilities used for storing important data

A

data storage

25
used to monitor and manage interactions with third parts that they have relationships with
vendor management
26
connectivity between systems of an organization and its third parties
system intergration
27
officially released software security update intended to repair a vulnerability
patch
28
vulnerability exploited by attackers before anyone else even know it exhists
zero day
29
pathway or avenue used by a threat actor to penetrate a system
attack vector
30
attack vector in which a threat actor can gain direct physical access to a computer
direct access
31
gathering data by relying on the weakness of individuals
social engineering
32
using social engineering to sway attention and sympathy in a particular direction
influence campaigns
33
influence campaign used on social media and other resources
Hybrid warfare influence campaign
34
influencing a subject before an event occurs
prepending
35
using impersonation to obtain private information
pretexting
36
sending an email or web announcement falsely claiming to be a legitimate enterprise to trick user to surrendering personal information
phising
37
targets specific users
spear phising
38
targeting wealthy individuals or senior executives with a buisness
whaling (type of spear phising)
39
using a telephone call to perform a phising
vishing (voice phising)
40
using short messages services (SMS) text mesages to perform phising
smishing (text phising)
41
purchasing domain names of sites that are spelled similarly to actual sites
typo squatting ## Footnote Ex: google.net instead of google.com
42
exploiting a URL converted into a corresponding IP address to redirect traffic a way to fake website
pharming
43
when an attacker directs a user to fake look alike site
redirection
44
unsolicited email sent to large number reipients
spam
45
spam delivered through imessage instead of email
spim
46
false warning oftem contained in email claiming to come from IT department
hoax
47
attack directed toward a smaller group of specific individual
water hole attack ## Footnote Ex: major executives working for a manufacturing company
48
digging thorugh trash to find information that can be useful in a an attack
dumpster driving ## Footnote Ex: calendars,policy manuals, memos
49
following an authorized user through a door
tailgating
50
watching an indivual enter a security code in on a keypad
shoulder surfing