CYBERSECURITY - A WORLD OF EXPERTS AND CRIMINALS Flashcards

1
Q

This group of criminals breaks into computers or networks to gain access for various
reasons

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

attackers break into networks or computer systems to discover weaknesses in order to
improve the security of these systems.

A

White hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

attackers are somewhere between white and black hat attackers. The gray hat attackers may
find a vulnerability and report it to the owners of the system if that action coincides with their agenda.

A

Gray hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

attackers are unethical criminals who violate computer and network security for personal gain,
or for malicious reasons, such as attacking networks.

A

Black Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Teenagers or hobbyists mostly limited to pranks and vandalism, have little or
    no skill, often using existing tools or instructions found on the Internet to launch attacks.
A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Grey hat hackers who attempt to discover exploits and report
them to vendors, sometimes for prizes or rewards.

A

Vulnerability Brokers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Grey hat hackers who rally and protest against different political and social
ideas. Hacktivists publicly protest against organizations or governments by posting articles,
videos, leaking sensitive information, and performing distributed denial of service (DDoS)
attacks.

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These are black hat hackers who are either self-employed or
working for large cybercrime organizations.

A

Cyber Criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Depending on a person’s perspective, these are either
white hat or black hat hackers who steal government secrets, gather intelligence, and
sabotage networks. Their targets are foreign governments, terrorist groups, and
corporations

A

State Sponsored Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a weakness that makes a target susceptible to an attack

A

Cyber vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

recognize the threat that data poses if used against people

A

Cybersecurity specialists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the possibility that a harmful event, such as an attack, will occur

A

cybersecurity threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

are particularly dangerous to certain industries and the type of
information they collect and protect

A

Cyber threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

possess the insight to recognize the influence of data and
harness that power to build great organizations, provide services and protect people
from cyberattacks

A
  • Cybersecurity specialists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

are an example of Information Security
Management Standards. The standards provide a framework for implementing
cybersecurity measures within an organization.

A

ISO 27000 standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The following examples are just a few sources of data that can come from established
organizations:

A

Personal Information
Medical Records
Education Records
Employment and Financial Records

17
Q

Criminals use _______-______ tools to capture data streams over a network. Packet
sniffers work by monitoring and recording all information coming across a network.

A

Packet Sniffing Tools

18
Q

interferes with an established network
communication by constructing packets to appear as if they are part of a communication.

A

Packet Injection

19
Q

An internal user, such as an employee or contract partner, can accidently or intentionally

A

Internal Security Threats

20
Q

Big data is the result of data sets that are large and complex, making traditional
data processing applications inadequate

A

Impact of Big Data

21
Q

Big data poses both challenges and opportunities based on three
dimensions:

A

The amount of data
The speed of data
The range of data types and sources

22
Q

is a continuous computer hack that occurs under the radar against a specific object. Criminals usually
choose an APT for business or political motives.

A

Advanced Persistent Threat

23
Q

can track system self-reporting data, like how much energy a computer is using, and use that information to select
targets or trigger false alerts

A

Algorithm Attacks

24
Q

are more devious because they exploit designs used to improve energy savings,
decrease system failures, and improve efficiencies.

A

Algorithm Attacks

25
Q

In the past, attacks would select the low hanging fruit or most vulnerable victims. Many of the most
sophisticated attacks will only launch if the attacker can match the signatures of the targeted victim.

A

Intelligent selection of victims

26
Q

refers to multiple enterprises that let their users use the same identification credentials gaining access to
the networks of all enterprises in the group. The goal of federated identity management is to share identity information automatically
across castle boundaries.

A

Federated Identity Management

27
Q

uses phone calls against a target telephone network tying up the system and
preventing legitimate calls from getting through.

A

Telephone denial of service or TDOS attack

28
Q

The Seven Categories of Cybersecurity Work

A

Operate and Maintain
Protect and Defend
Investigate
Collect and Operate
Analyze
Oversight and Development
Securely Provision

29
Q

includes providing the support, administration, and maintenance required to ensure IT system
performance and security

A

Operate and Maintain

30
Q

includes the identification, analysis, and mitigation of threats to internal systems and networks

A

Protect and Defend

31
Q

includes the investigation of cyber events and/or cyber crimes involving IT resources

A

Investigate

32
Q

includes specialized denial and deception operations and the collection of cybersecurity information

A

Collect and Operate

33
Q

includes highly specialized review and evaluation of incoming cybersecurity
information to determine if it is useful for intelligence

A

Analyze

34
Q

provides for leadership, management, and direction to
conduct cybersecurity work effectively

A

Oversight and Development

35
Q

includes conceptualizing, designing, and building secure IT systems

A

Securely Provision

36
Q

How to Become a Cybersecurity Specialist

A

Study
Pursue Certifications
Pursue Internships
Join Professional Organizations

37
Q

Industry Certifications

A

CompTIA Security+
CEH
GSEC
CISSP
CISM
CCNA SECURITY
Company Sponsored Certifications

38
Q

An internal user, such as an employee or contract partner, can accidently or intentionally

A

Internal Security Threats

39
Q

External threats from amateurs or skilled attackers can exploit vulnerabilities in networked devices, or can use social
engineering, such as trickery, to gain access.

A

External Security Threats