Cyber Security Flashcards

1
Q

What is involved in risk management?

A

Identifying and controlling as many risk factors as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an asset?

A

Any item with value owned by an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an asset example?

A
  • Hardware
  • Software
  • Information and data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is meant by Identifying assets and analysing risks?

A

Valuing assets to assess whether their worth protecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do businesses mitigate risks?

A

Monitor activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What information is contained in risk monitoring logs?

A
  • Who logged on and when
  • Which files were read, edited or deleted
  • Network stats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is remediation?

A

the process of dealing with vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is patch deployment remediation?

A

Software issues are reported back to the manufacturers that fix them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is manual remediation?

A

Smaller organisation cant afford monitoring software so the technician will be responsible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is automated remediation?

A

Tools that identify and repair vulnerabilities without technicians.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the vulnerability management cycle?

A
  • Discover vulnerabilities
  • prioritise assets
  • report vulnerabilities
  • re mediate vulnerabilities
  • verify
    REPEAT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What software can be used to monitor networks?

A

IDS, NIDS, HIDS - intercept and inspect network packets

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an IPS?

A

Monitor the network for malicious incidents and capturing information about them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What threats to IPS deal with?

A
  • Denial of Service (DoS) attack
  • Distributed Denial of Service (DDoS) attack
  • Viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the signature-based approach to protecting networks?

A

Attacks are matched with the signatures or patterns, the system takes necessary action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the anomaly-based approach to protecting networks?

A

The system monitors and blocks abnormal or unexpected behaviour on the network.

17
Q

What is the policy-based approach to protecting networks?

A

Policies are configured according to network infrastructure.

18
Q

What are network security tests?

A

Looks at different ways the network can be connected how they can be exploited.

19
Q

What is social engineering?

A

Employees tested to see if they would give away sensitive information

20
Q

What are physical security tests?

A

this is where people will try to gain physical access to buildings or data

21
Q

What are examples of policies to ensure staff are not putting data at risk?

A
  • password policy
  • Digital signature policy
  • Disaster recover plan