Cybersecurity Flashcards

1
Q

What is Lateral Movement?

A

Once within the system, the hacker can access other areas within the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Firmware?

A

permanent software programmed in read only memory or hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does “DDoS” stand for and what is a DDoS attack?

A

(Distributed Denial of Service Attack); malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Zombie Machine?

A

A machine one can control because they are vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is difficult to filter the high amount of data when an attack comes from multiple ______?

A

Nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three Factors impacting security:

A

The amount of time it takes, the amount of money (resources) and probability of success.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When designing a system, what is the “KISS” rule?

A

Keep it Simple, Stupid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_________ Surface

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three types of entities?

A

1) Software
2) Hardware
3) Humanware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Pseudo Anonymity?

A

Pseudonymous merely means you are not using your real, legal name to identify yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Bug Bounty?

A

A bug bounty is a reward that is paid out to developers who find critical flaws in software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “Kerckhoff’s principle?

A

Kerckhoff’s principle is the concept that a cryptographic system should be designed to be secure, even if all its details, except for the key, are publicly known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Three fundamental questions you need to ask yourself when designing a system?

A

1) What assets do we need to protect? Ex. Phone, data, system, etc
2) How are those assets threatened?
3) What can we do to counter those threats?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three components of computer security?

A

Integrity
Availability
Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is integrity?

A

Guarding against improper information modification or destruction. Including ensuring information non-repudiation and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is dat availability?

A

Ensuring timely and reliable access to an use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is data confidentiality?

A

Preserving authorized restrictions on information access and disclosure. Including means for protecting personal privacy and proprietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are 6 Computer Security Challenges?

A
  1. Attackers only need to find a single weakness, the developer/admin needs to find ALL the weaknesses.
  2. The attacker can exploit Multiple weaknesses
  3. Users and system managers tend to no see the benefits of security until a failure occurs
  4. Security requires regular and constant monitoring
  5. It’s often an afterthought + incorporated into a system after the design is completed
  6. Thought of as an impediment to efficient and user-friendly operations
19
Q

Three types of System Vulnerabilities (of System Resources)

A

Corrupted (loss of integrity)
Leaky (loss of confidentiality)
Unavailable or very slow (loss of availability)

20
Q

3 Types of attacks

A

Active – Attempt to alter/affect system resources
Passive – does not (directly) affect the system resources
Insider vs Outsider

21
Q

What is “Legacy Approach”?

A

Bad guys are outside, good guys are inside your org.

22
Q

Dealing with a Security Attack (3x)

A

Prevent
Detect
Recover

23
Q

What is the Old Encryption Standard - Acronym and meaning) + how many bits ?

A

Data Encryption Standard (DES) + 56 bits

24
Q

What is the New Encryption Standard - Acronym and meaning) + how many bits ?

A

Advanced Encryption Standard (AES) + 64 BITS

25
Q

What is a countermeasure?

A

an action, device, procedure, or
technique that reduces a threat, a vulnerability, or an
attack by eliminating or preventing it, by minimizing the
harm it can cause

26
Q

What is Security Policy?

A

a set of rules and practices that specify
how a system or organization provides security services to
protect sensitive and critical system resources

27
Q

Active Attack

A

attempt to alter/affect system resources

28
Q

Passive Attack

A

does not (directly) affect the system resources

29
Q

Three Types of Attacks

A

Active
Passive
Insider/Outsider

30
Q

Interception (Unauthorized Disclosure)

A

Unauthorized access to data

31
Q

Inference (Unauthorized Disclosure)

A

traffic analysis or use of limited

access to get detailed information

32
Q

What is intrusion? (Unauthorized Disclosure)

A

unauthorized access to sensitive data

33
Q

What is a Masquerade? (Deception)

A

e.g., Trojan horse; or an attempt by
an unauthorized user to gain access to a system by
posing as an authorized user

34
Q

What is Falsification? (Deception)

A

altering or replacing of valid data or

the introduction of false data

35
Q

What is repudiation? (Deception)

A

an entity deceives another by falsely

denying responsibility for an act?

36
Q

What is incapacitation? (Disruption)

A

a result of physical destruction of or

damage to system hardware

37
Q

What is Corruption? (Disruption)

A

system resources or services function in

an unintended manner; unauthorized modification

38
Q

What is obstruction? (Disruption)

A

e.g. overload the system or interfere

with communications

39
Q

What is Misappropriation? (Usurpation)

A

an entity assumes unauthorized

logical or physical control of a system resource

40
Q

What is misuse? (Usurpation)

A

causes a system component to perform a
function or service that is detrimental to system
security

41
Q

What are the 4 kinds of Threat Consequences?

A
  1. Unauthorized disclosure
  2. Deception
  3. Disruption
  4. Usurpation
42
Q

What is a Passive Attack?

A

Passive attacks attempt to learn or make use
of information from the system but does not
affect system resources

43
Q

What is an Active Attack and what are the 4 main types?

A

Masquerade
Replay
Modification of Messages
Denial of Service