CYBERSECURITY Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Types of Cybersecurity

What is Cybersecurity?

A

Cybersecurity protects data, devices, and networks from attackers, criminals, and anyone harming a system. Any software that contains sensitive information, such as medical records or financial information, must be equipped to handle cyberattacks to avoid theft or corruption. Inadequate security measures could expose your devices and data to harmful threats like malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Cybersecurity

What is Application Security?

A

App security is the creation of security features for apps to prevent cyberattacks and account for any exploitable vulnerabilities in the software. Application security is crucial to the reliability and functionality of the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Cybersecurity

What is Cloud Security?

A

Cloud security is a segment of IT that deals with handling risks and problems with a cloud-based network. It also entails finding and implementing solutions, mostly wirelessly. Cloud security specialists assist the needs of the cloud in terms of memory, security, and any possible vulnerabilities that need patching.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Cybersecurity

What is Critical Infrastructure Security?

A

Critical infrastructure security is technological security typically used by the public to protect assets, systems, and networks that belong to a community, city, or country. This sector of cybersecurity focuses on the defense of municipal and government-owned infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Cybersecurity

What is Information Security (InfoSec)?

A

Information security is about securing information and preventing fraudulent access and interception of personal details. It primarily focuses on protecting sensitive data and information. InfoSec specialists determine where valuable data is stored and develop safeguards to protect that information from being modified or accessed. Information security deals with confidentiality, integrity, and availability, which determine the quality of a system that manages or holds information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Cybersecurity

What is Network Security?

A

Network security defends the reliability and security of a company’s infrastructure. Network security focuses on network integrity to ensure systems are secure enough to prevent malicious actors from infiltrating them via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of cyber threats

What is cyber threat?

A

A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Those who attack information systems are often motivated by the potential for monetary gain. However, some bad actors attempt to steal or destroy data for political reasons, as an insider threat to the company they work for, to boost the interests of their country, or simply for notoriety. The attack vector (method of cyberattack) varies. Five common attack strategies are password attacks, phishing attacks, DOS attacks, man-in-the-middle attacks and Malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of cyber threats

What are password attacks?

A

Password cracking is one of the most widespread methods for fraudulently gaining system access. Attackers use various tactics to steal passwords to access personal information or sensitive data. Password crackers sometimes use brute force attacks. In other words, they guess every possible password until there’s a match. They may also use dictionary attacks, where a program tries many common passwords for them to find a match, among other more complicated algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of cyber threats

What are phishing attacks?

A

Phishing scams are one of the most persistent threats to personal systems. This practice involves sending mass emails disguised as being from legitimate sources to a list of users. These emails contain malicious links that, when clicked, can install malware and allow illegitimate access to personal information. These attacks can also occur on websites, social media, or over the phone (also known as vishing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of cyber threats

What are DOS attacks?

A

DOS stands for denial-of-service attack. This cyberattack occurs when software or a group of devices attempt to overload a system so it cannot properly serve its purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of cyber threats

What are man-in-the-middle attacks?

A

A man-in-the-middle attack occurs when an attacker exploits security vulnerabilities in a network to insert themselves into a two-machine interaction. They then monitor the IP packets being sent back and forth. In this way, they can intercept valuable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of cyber threats

What are Malware attacks?

A

Malware attacks are software designed to exploit a system or act maliciously against a user or institution. Many types of malware attacks exist, such as viruses, trojans, worms, ransomware attacks, and spyware. Almost all of these types of software deploy themselves and use system vulnerabilities to infect other machines, capture specific data, or simply disrupt or damage a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly