Cyber Security - Intro to Security Flashcards

1
Q

Sophisticated Attacks

A

These attacks are complex and are difficult to detect and thwart. They use common internet tools and protocols which make it hard to tell if its an attack or traffic. Their behavior also varies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Proliferation of Attack Software

A

Wide variety of attack tools that are available on the internet that anyone can use if they have moderate technical knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack Scale and Velocity

A

The scale and velocity of an attack could grow to millions of computers in minutes or days because of its ability to proliferate on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Ensures that data is not disclosed to unintended people. This can happen through encryption which converts the data to a form that is harder for a unintended person to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity

A

Ensures data isn’t modified or tampered with. Provided through hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

Ensures uptime of the system so that data is available when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-repudiation

A

Provides validation of a messages origin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical Security

A

Includes all hardware and software necessary to secure data. Firewalls and antivirus softwares.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Users and Administrators

A

The people who use the software and people who manage the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policies

A

Rules an organization implements to protect information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asset

A

Something that has value to the person or the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat

A

Entity that can cause the loss of an asset or any potential danger to the confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Agent

A

Entity that can carry out a threat. Example is when a disgruntled employee who copies a database to a thumb drive and sells it to a competitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerability

A

Weakness that allows a threat to be carried out. Such as a USB port that is enabled on the server hosting the database or a server room door that is open.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exploit

A

Procedure or product that takes advantage of a vulnerability to carry out a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Employee Threat Agent

A

Employees can be overlooked and most dangerous threat because that have a greater access to the information assets than anyone else.

17
Q

Spy Threat Agent

A

Spies can be employed in a corporate to obtain information about competitors or for commercial purposes

18
Q

Hacker

A

A Hacker is any threat agent who uses their technical knowledge to bypass certain security mechanisms to exploit something in a system, usually a vulnerability