CYBER 160 Module 1~ Introduction to Security Flashcards

1
Q

tasks of securing digital information, whether manipulated by micro processor (personal computer) or a storage device or transmitted over a network

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 protections over information (CIA)

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

individual or entity responsible for cyber incidents against the technology equipment of enterprises and users

A

threat actor or malicious actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

attacker who violates computer security for personal gain

Ex: steal credit card numbers or inflicts mailicous damage (corrupts a hard drive)

A

black hat hacker

type of hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

attackers that study’s a system with the organization permission for weakness and privately provides that information to the organization

A

white hat hackers

type of hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

attacker who attempts to break into a computer system without an organizations permission to publically disclose the attack and shame the organization into taking action

A

gray hat hackers

type of hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

individual who wants to perform attacks, yet lack the technical knowledge to carry them out

A

script kiddes

type of threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attacker strongly motivated by beliefs or principles

A

Hactivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

government sponsored attackers who launch cyber attacks against the foes of the states

A

state actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

class of attacks that uses innovative attack tools to affect and silently extract data over an extended period of time

A

Advanced persistent threat (APT)

most commonly associated with state actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attacker that manipultaes data from a position of a trusted employee

A

Insider threat

Ex: healthcare worker passed on for a promotion might sell celebrity health care records to the media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

threat actor who moved from traditional criminal activiries to more rewarding and less risky online attacks

A

cryminal sindicates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a system that consists of the hardware device and operating system that runs software such as application programs or processes

A

platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

platform thats no longer in widespread use because its been replaced by an updated version of the eearlier technology

A

legacy platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

software and technology located with in the physical confines of an enterprise which is usually stronger in the company’s data center

A

on-premises platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

pay per use computing model in which customer pay for the resources they need

A

cloud platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

configuration settings that aren’t properly implemented, resulting, invulnerabilities

A

weak configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

default settings set by vendor for usability and ease and not for security

A

default settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

unprotected account that gives unrestricted access to all resources

A

unsecure root accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

user access over files that should have been restricted

A

open permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

using protocols for telecommunicatioin that don’t provide adequate protection

A

insecure or unsecure protocols

22
Q

external entities outside of the organization

A

third parties

Ex: marketing agencies,landscapers, attorneys

23
Q

contracting with the third parties to assist organizations in developtment and writing of software programs

A

outsourced code development

24
Q

third party facilities used for storing important data

A

data storage

25
Q

used to monitor and manage interactions with third parts that they have relationships with

A

vendor management

26
Q

connectivity between systems of an organization and its third parties

A

system intergration

27
Q

officially released software security update intended to repair a vulnerability

A

patch

28
Q

vulnerability exploited by attackers before anyone else even know it exhists

A

zero day

29
Q

pathway or avenue used by a threat actor to penetrate a system

A

attack vector

30
Q

attack vector in which a threat actor can gain direct physical access to a computer

A

direct access

31
Q

gathering data by relying on the weakness of individuals

A

social engineering

32
Q

using social engineering to sway attention and sympathy in a particular direction

A

influence campaigns

33
Q

influence campaign used on social media and other resources

A

Hybrid warfare influence campaign

34
Q

influencing a subject before an event occurs

A

prepending

35
Q

using impersonation to obtain private information

A

pretexting

36
Q

sending an email or web announcement falsely claiming to be a legitimate enterprise to trick user to surrendering personal information

A

phising

37
Q

targets specific users

A

spear phising

38
Q

targeting wealthy individuals or senior executives with a buisness

A

whaling (type of spear phising)

39
Q

using a telephone call to perform a phising

A

vishing (voice phising)

40
Q

using short messages services (SMS) text mesages to perform phising

A

smishing (text phising)

41
Q

purchasing domain names of sites that are spelled similarly to actual sites

A

typo squatting

Ex: google.net instead of google.com

42
Q

exploiting a URL converted into a corresponding IP address to redirect traffic a way to fake website

A

pharming

43
Q

when an attacker directs a user to fake look alike site

A

redirection

44
Q

unsolicited email sent to large number reipients

A

spam

45
Q

spam delivered through imessage instead of email

A

spim

46
Q

false warning oftem contained in email claiming to come from IT department

A

hoax

47
Q

attack directed toward a smaller group of specific individual

A

water hole attack

Ex: major executives working for a manufacturing company

48
Q

digging thorugh trash to find information that can be useful in a an attack

A

dumpster driving

Ex: calendars,policy manuals, memos

49
Q

following an authorized user through a door

A

tailgating

50
Q

watching an indivual enter a security code in on a keypad

A

shoulder surfing