Cybersecurity Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is Network Security?

A

A range of measures that can be take to protect network data from accidental or malicious damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cybersecurity?

A

The practice of protecting systems, networks and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware?

A

Programming or code that is used to disrupt computers by

  • Gathering sensitive information
  • Gaining access to private computer systems
  • Display unwanted advertising
  • Distributing the performance of a computer or network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hackers

A

Individuals who will violate computer security for malicious or financial reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Planting the Flag?

A

Individuals who may seek financial reward for finding vulnerability, but are more interested in finding vulnerabilities than gaining something for themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Ethical Hacker?

A

Individuals whose activities are designed to test and enhance computer security; they may also be known as ethical hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is dos?

A

A denial of service attack (DoS attack) is a cyberattack in which a criminal makes a network resource unavailable to its intended users by flooding the targeted machine or website with lots of requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DDos?

A

In a distributed denial of service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This makes it impossible to stop the attack simply by blocking a single source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SQL Injection?

A

SQL injection occurs when malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly