Cybersecurity 101 Flashcards

1
Q

Rubber Ducky

A

Type of cyberattack using USB that – when plugged in – acts like a keyboard and inputs pre-programmed keystrokes at high speed that can execute commands or scripts that can steal sensitive information, install malicious software, or give the attacker unauthorized access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA Triad

A

Confidentiality, Integrity, Availability; all are important and must be balanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

CIA Triad; protecting information from being modified by unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

CIA Triad; the state of being kept secret/private; ensuring that sensitive information does not reach unauthorized people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

CIA Triad; ensuring timely and reliable access to and use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you prevent integrity attacks?

A

Use a secure hashing algorithm and process when transferring data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you prevent confidentiality attacks?

A

Using measures like encryption and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you mitigate availability attacks?

A

Create regular backups of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hashing

A

A way to keep sensitive information and data secure; one-way mathematical function that turns data into a string of nondescript text that cannot be reversed or decoded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Assessment

A

Structured process of identifying the threats posed to a group or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Mitigation

A

Systematic reduction of the impact or occurrence of a negative event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering

A

Manipulation technique that exploits human error to gain private information, access, or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

Fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal/sensitive information, such as passwords and credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Man in the Middle

A

Threat actor puts themselves in the middle of two parties, typically a user and an application, to intercept their communications and data exchanges and use them for malicious purposes like making unauthorized purchases or hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packet Sniffing

A

A method of detecting and assessing packet data sent over a network; usually done by admin but can be done by hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware

A

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system

17
Q

Brute-Force Attack

A

Cyber attack where a hacker guesses information, such as usernames and passwords, to access a private system

18
Q

Code Injection

A

Attack that inject code into an application. Code injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell