Cyber Security Flashcards
What does CIA stand for?
Confidentiality, Integrity, Availability
Define confidentiality
Data is accessed by only those with the right permit
Define Integrity
Data is not tampered or altered in anyway
Define availability
data and resources are able to be accessed and shared
What does DAD stand for?
Disclosure, Alteration, Deniability
Define disclosure
data is accessed by non-authorized individuals
Define alteration
Data has been compromised or tampered with
Define deniability
access to data and resources are blocked
Define blacklist
a list of banned IP addresses, applications, or users
Define whitelist
a list of allowed IP addresses, applications, or users
Define cat fishing
the process of creating a fake online profile in order to trick people into believing they are someone else
Define zero day?
A threat that is unknown to security specialists and has not been addressed
Define hack value
describes a target that may attract an above average level of attention from an attacker
Define non-repudiation
once an action is carried out by a party, it cannot be denied by that same party
Define logic bomb
Malicious code that is only triggered when a set of conditions are met
Define obfuscation
the tactic of making code unclear so that humans or programs like an antivirus cannot understand it
Define honey pot
a decoy or trap for hackers
Define spoof
the act of falsifying the indentity of the source of a communication or interaction
What is a protocol?
a set of rules that determine how computers communicate with each other
What does HTTP stand for?
Hyper Text Transfer Protocol
Is HTTP stateless or stateful?
stateless
What is SSL?
Secure Socket Layer
What is SSH?
Secure Shell
What is FTP?
File Transfer Protocol
What is SFTP?
Secure File Transfer Protocol
What is IMAP?
Internet Message Access Protocol
What is SMTP?
Simple Mail Transfer Protocol
What is a cookie?
Pieces of text of stored by a web server on your had disk
What are cookies used for?
identify a user, check for their past activity on the website and use this record to provide the most relevant information to the user
What is TCP?
Transmission Control Protocol divides a message or file into packets that transmitted over the internet more efficiently
What is IP?
Internet Protocol is responsible for the address of each packet so it is sent to the correct destination
What are the 4 layers of TCP/IP?
Datalink Layer, internet/networking layer, Transport layer, application layer
What is the datalink layer of TCP/IP?
consists of protocols that operate on a link that connects hosts on a network e.g. ethernet
Internet/Networking layer
connects independent networks together e.g. IP
Transport Layer
handles communication between hosts e.g. TCP
Application Layer
standardizes data exchange for applications e.g. HTTP, FTP
What are the 5 main Social Engineering Tactics?
Baiting, Pretexting, Quid Pro Quo, Phishing, Vishing
What is a brute force attack?
A trial and error attack against passwords
What is a dictionary attack?
A type of brute force attack that goes through all the words of a dictionary
What is phishing?
An email that contains a malicious link or file
What is a spear phishing attack?
a phishing attack directed a specific individual
What is vishing?
Phishing attack with a phone call
What is smishing?
Phishing over text
True or False: Botnets are very often used in DDoS attacks
True
What are the three ways to prevent DDoS attacks from taking down your server?
Overprovision bandwidth, Creating a DDoS playbook, outsourcing protection to DDoS specialist
What is the Man in the Middle Attack?
An attack where the attacker intercepts and potentially alters messages between computers
What is a SQL Injection attack?
An attack where the attacker sends a malicious SQL statement to gain access to a database
What is a XSS attack?
A cross site scripting attack is when a attacker sends malicious scripts of code into a website or website application. When a visitor comes to the website, their computer is infected
What is a supply chain attack?
When hackers get into company A by getting into Company B’s network (where company B has access to company B)
What is the server that is used to issue commands to bots in a botnet?
command and control server
What are viruses/worms?
Malicious code written to alter the way a computer or a network operates
True or False: A virus requires an active host program or already infected system to run
True
is a worm or a virus self replicating and self propagating
a worm
What is a trojan?
Powerful malware disguised as legitimate software
What are the 4 types of Trojans?
backdoor trojans, infostealer trojan, trojan downloader, trojan DDoS
What is Adware?
a program that displays unwanted banner advertisements
What is spyware?
malware that monitors computer and internet use
What is ransomware?
when a hacker encrypts a users data until the user pays the hacker to decrypt their data or threatens to release sensitive data unless a payment is received
What is a firewall?
A security device that monitors incoming and outgoing network traffic
What are the two types of firewalls?
hardware firewall and software firewall
What are the two major types of encryption?
Symmetric and Asymmetric
What is the difference between symmetric and asymmetric encryption?
symmetric uses the same key for encryption and decryption while asymmetric uses different keys
What is an antivirus?
a software used to protect a computer from malware
How does antivirus work?
identifies signatures of already identified malware or it runs the software in a sandbox and observes how it runs
What are the main authentication factors
Knowledge factor (password), possession factor (keycard), inheritance factor (fingerprint)
What is a DMZ?
A demilitarized zone is a physical or logical subnetwork that separates networks from other untrusted networks
What is a security policy?
a written document that describes how an organizations protects it virtual and physical data assets
What does BYOD stand for?
Bring your own device
What is the weakest link in a companies security?
an employee