CYBERSECURITY Flashcards
Types of Cybersecurity
What is Cybersecurity?
Cybersecurity protects data, devices, and networks from attackers, criminals, and anyone harming a system. Any software that contains sensitive information, such as medical records or financial information, must be equipped to handle cyberattacks to avoid theft or corruption. Inadequate security measures could expose your devices and data to harmful threats like malicious software.
Types of Cybersecurity
What is Application Security?
App security is the creation of security features for apps to prevent cyberattacks and account for any exploitable vulnerabilities in the software. Application security is crucial to the reliability and functionality of the software.
Types of Cybersecurity
What is Cloud Security?
Cloud security is a segment of IT that deals with handling risks and problems with a cloud-based network. It also entails finding and implementing solutions, mostly wirelessly. Cloud security specialists assist the needs of the cloud in terms of memory, security, and any possible vulnerabilities that need patching.
Types of Cybersecurity
What is Critical Infrastructure Security?
Critical infrastructure security is technological security typically used by the public to protect assets, systems, and networks that belong to a community, city, or country. This sector of cybersecurity focuses on the defense of municipal and government-owned infrastructure.
Types of Cybersecurity
What is Information Security (InfoSec)?
Information security is about securing information and preventing fraudulent access and interception of personal details. It primarily focuses on protecting sensitive data and information. InfoSec specialists determine where valuable data is stored and develop safeguards to protect that information from being modified or accessed. Information security deals with confidentiality, integrity, and availability, which determine the quality of a system that manages or holds information.
Types of Cybersecurity
What is Network Security?
Network security defends the reliability and security of a company’s infrastructure. Network security focuses on network integrity to ensure systems are secure enough to prevent malicious actors from infiltrating them via the internet.
Types of cyber threats
What is cyber threat?
A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Those who attack information systems are often motivated by the potential for monetary gain. However, some bad actors attempt to steal or destroy data for political reasons, as an insider threat to the company they work for, to boost the interests of their country, or simply for notoriety. The attack vector (method of cyberattack) varies. Five common attack strategies are password attacks, phishing attacks, DOS attacks, man-in-the-middle attacks and Malware.
Types of cyber threats
What are password attacks?
Password cracking is one of the most widespread methods for fraudulently gaining system access. Attackers use various tactics to steal passwords to access personal information or sensitive data. Password crackers sometimes use brute force attacks. In other words, they guess every possible password until there’s a match. They may also use dictionary attacks, where a program tries many common passwords for them to find a match, among other more complicated algorithms.
Types of cyber threats
What are phishing attacks?
Phishing scams are one of the most persistent threats to personal systems. This practice involves sending mass emails disguised as being from legitimate sources to a list of users. These emails contain malicious links that, when clicked, can install malware and allow illegitimate access to personal information. These attacks can also occur on websites, social media, or over the phone (also known as vishing).
Types of cyber threats
What are DOS attacks?
DOS stands for denial-of-service attack. This cyberattack occurs when software or a group of devices attempt to overload a system so it cannot properly serve its purpose.
Types of cyber threats
What are man-in-the-middle attacks?
A man-in-the-middle attack occurs when an attacker exploits security vulnerabilities in a network to insert themselves into a two-machine interaction. They then monitor the IP packets being sent back and forth. In this way, they can intercept valuable information.
Types of cyber threats
What are Malware attacks?
Malware attacks are software designed to exploit a system or act maliciously against a user or institution. Many types of malware attacks exist, such as viruses, trojans, worms, ransomware attacks, and spyware. Almost all of these types of software deploy themselves and use system vulnerabilities to infect other machines, capture specific data, or simply disrupt or damage a device.