cybersecurity Flashcards

1
Q

cybersecurity

A

availability, integrity, authentication, confidentiality, and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when was cybersecurity developed?

A

U.S. Air Force in 1976

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MIT Research scientist David Clark and David Wilson

A

Concept of developing security policies concerning info security (INFOSEC) was formalized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common model of cybersecurity?

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is Confidentiality

A

info only available to some

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is an example of confidentiality

A

example: FERPA and HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is integrity

A

data that should be maintained in a correct state and should not be modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is availability

A

makes sure that authorized people have access to info when and where it is rightly needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is availability ensured?

A

it is implemented using traditional methods such as hardware maintenance, software patching and network optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

availability

A

process such as system redundancy, failover, RAID and High availability cluster are used to weaken serious consequences when hardware issues occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is Dedicated Hardware Devices Can Be Used to Guard Against Downtime and Unreachable Data Due to Malicious Distributed Denial-of-Service (DDoS) Attacks, a part of?

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

should you have access to the info?

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

do i trust the data?

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

am i able to access the data when i want?

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

social engineering

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Social Engineering

A

Use to Get Victims to Take Some Sort of Questionable Action Through Deception, Often Involving a Breach of Security That Oftentimes Includes Revealing Confidential or Private Information or Sending Money (in person or technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what can Social Engineering do?

A

manipulate our emotions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

phishing

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

phishing

A

Uses Email, Phone or Text to Entice Individuals into Providing Personal or Sensitive Information, Ranging From Passwords, Credit Card Information and Social Security Numbers to Details About a Person or Organization (only on technology)
i.e. scam emails or fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

spear phishing

A

email or Electronic Communications Scam Targeting Specific Individual, Organization or Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SMiShing

A

scam through text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what can phishing download

A

malware/ viruses, modern ware/ stuxnet, ransomware, denial of service/ botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

password protection

A

12-15 characters
keep it weird
don’t bunch up special characters
don’t use the same password
change once a year
use multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

people

A

people - threats
social engineering
phishing
spear phishing
smishing
password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

social engineering
phishing
spear phishing
smishing
password

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Technology

A

Zero Day Exploit
Deletion/Hardware Failure
RFID Hacking
(Distributed) Denial of Service (DDoS / DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

availability

A

Zero Day Exploit
Deletion/Hardware Failure
RFID Hacking
(Distributed) Denial of Service (DDoS / DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Encryption

A

Process of Converting Human Readable Text (plaintext) Into An Incomprehensible Text (ciphertext) Using a Cryptographic Key (numbers)

30
Q

VPN (Virtual Private Network)

A

Creates a “Data Tunnel” in Which Data Can Be Transmitted Or Shared (Sent/Received) Across a Public Network As If The Two Computers Were Directly Connected in a Private Network

31
Q

what does vpn do

A

hide your IP address by letting the network redirect it

32
Q

how does vpn help with privacy

A

your internet provider and other third parties cannot see what websites you visit or what data you send or receive online

33
Q

system redundancy

A

An Organizational Decision to Purposely Duplicate Critical Components or Functions of a Computer System With the Express Intention of Increasing The Reliability of the System - Usually in the Form of a Backup or to Improve Actual System Performance

34
Q

what is an example of system redundancy

A

backup system or the story of renting a back up place in kansas during a tornado

35
Q

process

A

-Harder to Design For / Against
-Generally Created in Response to A Previous Attack of Security Incident
-Attempting to Stop or Promote a Behavior
- Rules / Regulations / Policy

36
Q

threat

A

A Possible Danger That Might Exploit a Vulnerability To Reach Security and Cause Possible Harm

37
Q

control

A

Software, Hardware, Rules, or Procedures That Reduce or Eliminate the Threat to Information Security

38
Q

privacy

A

The Right to Determine When, and to What Extent

39
Q

current privacy concerns

A
  • facial recognition (biometrics)
  • video surveillance
    -public records
    -electronic surveillance
    -radio frequency identification (RFID)
40
Q

cookies

A

Small Files That Websites “Place” On Your Computer That Allow the Website to Remember Your “Preferences”.

41
Q

input

A

Any Information Sent From an Input Device to a Computer For Processing

42
Q

process

A

A Set of Instructions (Program) Executed By a Computer To Accomplish a Specific Task

43
Q

output

A

Anything That Comes Out of the Computer

44
Q

storage

A

The Ability to Record And/Or Retain Digital Data

45
Q

keyboard

A

input

46
Q

mouse

A

input

47
Q

scanner

A

input

48
Q

barcode

A

input

49
Q

hard disk

A

storage

50
Q

memory card/ flash drive

A

storage

51
Q

cd/dvd

A

storage

52
Q

ROM/RAM

A

storage

53
Q

CPU

A

process

54
Q

monitor

A

output

55
Q

speaker

A

output

56
Q

printer/projector

A

output

57
Q

parts of hardware

A

Central Processing Unit (CPU)
Network Interface
Graphics Card
SystemBus
Motherboard
Cache
Random-Access Memory (RAM)
secondary storage

58
Q

Motherboard

A

the main circuit board of the computer

59
Q

CPU (Central Processing Unit)

A

executes instructions

60
Q

system bus

A

communication pathway that allows computer components to talk to each other

61
Q

system bus

A

-measured in megahertz
-higher the speed, faster the computer

62
Q

cache

A

stores frequently used instructions on cpu

63
Q

cache

A

the more memory, the more expensive

64
Q

RAM (Random Access Memory)

A

holds info that is currently being used

65
Q

RAM memory

A

-short term memory
-volatile, it’ll be lost when computer is off
-double data rate (DDR)

66
Q

Secondary Storage

A

disk w/ lots of storage, data will survive if power if off

67
Q

binary

A

all content stored and processed by computer are 1 and 0

68
Q

operating system

A

the software that supports a computer’s basic functions

69
Q

operating system example

A

microsoft window or apple mac

70
Q

Application Software

A

productivity, games, internet, emails etc.

71
Q

Parkerian Hexad

A

The First INFOSEC Model Developed by Donn Parker in 1998, included the Concepts of: Confidentiality, Possession, Integrity, Authentication, Availability, and Utility.