Cyber Security Flashcards

1
Q

is the practice of protecting systems, networks, and programs from digital attacks. These attacks typically include business interruptions or the theft, tampering, or destruction of sensitive information.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pillars of Cyber Security

A

Policies & Procedures
Products & Services
Best Practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is now a combination of best practices, policies, and procedures along with various security products and services. All these concepts work together to make up the modern day cybersecurity stack.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data is protected against unauthorized changes

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data is protected from unauthorized access

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorized data access whenever you need it

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A model designed to guide policies for information security within an organization

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is kept secret to prevent: identity theft, compromised accounts and systems, legal concerns, damage to reputation, and other severe consequences.

A

Confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To determine if data should be confidential, ask:

A

Who is authorized?
Do confidentiality regulations apply?
Are there conditions for when data can be accessed?
What would the impact of disclosure be?
Is the data valuable?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

are always after sensitive information or personal data.

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To keep confidential data secure, control data access and use security tools like

A

encryption and multifactor authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is one of the most valuable assets a company can have, but it is NOT STATIC. It can be transferred to other systems, altered, and updated multiple times.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

guarantees that data is accurate, complete, and consistent.

A

Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It covers data in storage, during processing, and in transit

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Without this, loss, corruption, or compromise can cause significant damage and financial loss for both businesses and customers.

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2 Main Types of Integrity

A

Physical Data Integrity
Logical Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

are the checks and protocols that protect data from human error and hackers. These confirm that data is correct and accurate as it’s used in different ways within an organization

A

Logical data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is the collection of actions and fail-safes that protect the physical systems that store and process the data.

A

Physical data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

means that authorized users have immediate and reliable access to their data. This includes granting access to authorized users with passwords and security questions.

A

Data availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Some of the most fundamental threats to availability are

A

non-malicious, including hardware failures, unscheduled software downtime, and network bandwidth issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DoS

A

Denial of Service

23
Q

NIST Cybersecurity Framework

A

Identify
Protect
Detect
Respond
Recover

24
Q

What processes and assets need protection?

25
Implement appropriate safeguards to ensure protection of the enterprise's assets
Protect
26
Implement appropriate mechanisms to identify the occurrence of cybersecurity incidents
Detect
27
Develop techniques to contain the impacts of cybersecurity events
Respond
28
Implement the appropriate processes to restore capabilities and services impaired due to cybersecurity events
Recover
29
Weak security policies can lead to physical threats, tampering, or the theft of hardware.
Hardware Threats
30
is the art of unlocking a lock by analyzing and manipulating the components of the lock device, without the original key
Lock Picking
31
Unpatched systems, misconfigured firewalls, weak cybersecurity, and weak physical security are just a few ways that data threats occur
Data Threats
32
* Data Leaks & Data Breaches. * Data Dumps * Dumpster Diving
Data Threats
33
are the accidental exposure of confidential or sensitive data through a security vulnerability.
Data leaks
34
are when a data leak is caused intentionally by a cybercriminal. These occur when social engineering or phishing attacks trick employees into leaking sensitive credentials or information.
Data breaches
35
are when cybercriminals release stolen data onto the dark web for monetary gain.
Data dumps
36
is the act of physically searching through a literal dumpster to find something valuable.
Dumpster diving
37
Tech companies require ____ as a normal part of business because these can be stolen from the trash to harvest data that can be used for identity theft and data breaches, or the data could be sold to hackers, or a company's competitors.
document shredding and device destruction
38
is the unauthorized copy or use of copyright-protected software. This includes pirating software and counterfeiting activation codes.
Software or license theft
39
are pieces of code that use vulnerabilities in hardware or software to get into a system. Malware-infected websites use exploits to automatically download malware to a system. This is called a drive-by download.
Exploits
40
is a general term for software designed to compromise computer systems. This can cause system slowdowns, odd requests, browser misdirection, popup ads.
Malware (Malicious Software)
41
It can also steal data, record everything you do with or near your device, spam your contacts with infected links, and connect your computer to a network of hijacked computers that are remotely controlled (known as a botnet).
Malware (Malicious Software)
42
Malware can come from:
* attachments * sketchy websites * file downloads * infected USB drives * links in emails, ads, social media, torrents, and even text messages
43
are bits of code that insert themselves into another program.
Program viruses
44
affect Microsoft Office files via the macros they use to automate tasks.
Macro viruses
45
copy themselves to different locations to avoid antivirus scans.
Stealth viruses
46
This change their characteristics to get around cybersecurity defenses. 97% of all malware uses this
Polymorphic viruses
47
start themselves after identifying system weaknesses. They don’t rely on apps or files. Unlike other viruses, this can be controlled remotely.
Worms
48
This replicates itself to make copies that can infect other computers. These viruses are designed to spread to other devices.
Worm
49
trick you into installing legitimate-seeming software that includes harmful malware.
Trojans
50
collects personal data, login credentials, credit card information, online activity, and can record using a device’s camera or microphone.
Spyware
51
is software coded into online ads that records your personal data, website visits, and keystrokes to send you personalized ads. Both adware and spyware can be legitimate or malicious.
Adware
52
locks a system, encrypts its files, and displays a ransom demand. To get the encryption key you must pay the ransom, or you can regain access by doing a full system restore from a backup.
Ransomware
53
(EICAR)
European Institute for Computer Antivirus Research