Cybersecurity Double Test Flashcards
What does the CIA Triad stand for?
Confidentiality, Integrity, Availability
What does IAM stand for?
Identity and Access Management
Keylogger
Tracks and records a user’s every keystroke
Rainbow Table
Precomputed table of outputs of hash algorithm
Hashing
A way to encrypt; Can’t get output from input
What is a virtual machine?
A software emulation of a physical computer.
Ex: running Linux on windows
ITE
Isolated Testing Environment
Two types of UI
GUI and CLI
GUI
Graphical User Interface
CLI
Command Line Interface
Why CLI?
More efficient
What is training employees to not make cyber errors?
Mitigating the Human Factor
OSINT
Open Source Intelligence (ex. social media)
What is identifying potential threats and analyzing risks?
Threat Modeling
Encoding
Makes digital data understandable to humans
Encrypting
Used to make data secure, incoherent
What method cracks ciphers with no prior knowledge?
Frequency Analysis
How many possible shifts in Caesar Cipher?
25
What is concealing info within a text or image?
Steganography
Examples of Steganography?
Backward messaging, Revolution letter technique, unusual pattern within image
How is the system secured?
Through system hardening
Additional input added into a hash function, adds complexity
Salt
Assuring data is only accessible to authorized individuals
Confidentiality
Ensuring the accuracy of data
Reliability
Guarantees data is available when needed
Availability
Attack that uses the same password on multiple accounts
Password Spraying
Attack that utilizes personal/credential data of someone
Credential stuffing
Breach where an employee releases data
Insider Leak
Data breach through negligence
Unintended disclosure
Principle of least Priviledge
Giving people absolute minimum digital power they need to do their job
Used to verify integrity of data
Hashes
Fabricated scenarios to scam
Pretexting
Offering enticing items to scam
Baiting
Sensitive info for sensitive info scam
Quid Pro Quo
When you specifically are the target
Spear-phishing
Website impersonation phish
SEO Trojans
Redirect scams
Pop-up phishes
Phishing through text
Smishing
Phishing through voice call
Vishing
Attack where someone reads all traffic while on wi-fi
Man In The Middle
Hijack of DNS attack
Pharming
Spamming ips attack
Snowshoeing
Used to mitigate human factor
Zero trust strategy
Assigns numbers (evaluated from binary) to English characters
ASCII
Is hashing reversible?
nein