cybersecurity_flashcards_sections_1_to_6
What is Cybersecurity?
Protecting systems, networks, and data from cyber threats.
Why is Cybersecurity important?
It prevents data theft, financial loss, and reputational damage.
What are common Cyber Threats?
Malware, Phishing, Ransomware, DDoS, etc.
What is the difference between Ethical and Malicious Hacking?
Ethical hacking is legal and for protection; malicious hacking is illegal.
What are Cybersecurity Laws?
Rules that govern cybercrime and ethical hacking practices.
What are the OSI & TCP/IP models?
Frameworks for understanding how networks operate.
What is IP Addressing and Subnetting?
Assigning and dividing IP addresses in a network.
What are common network protocols?
HTTP, HTTPS, FTP, SSH, etc.
What is a Firewall?
A security device that filters incoming/outgoing traffic.
What are IDS and IPS?
Intrusion Detection and Prevention Systems.
What is a VPN?
A secure, encrypted connection over a public network.
What is Passive Reconnaissance?
Gathering information without interacting with the target.
What is Active Reconnaissance?
Direct interaction with the target system.
What is OSINT?
Open-Source Intelligence gathering from public sources.
What is WHOIS Lookup?
Retrieving domain ownership details.
What is DNS Enumeration?
Finding DNS records of a domain.
What is Google Dorking?
Using advanced search operators to find sensitive data.
What is Shodan?
A search engine for Internet-connected devices.
What is Social Engineering?
Manipulating people to give up confidential info.
What is Network Scanning?
Finding live systems and open ports.
What is Nmap?
A tool to scan ports and services.
What is Banner Grabbing?
Getting service info from open ports.
What is a Vulnerability Scanner?
Tool like Nessus or OpenVAS to find system weaknesses.
What is SNMP Enumeration?
Getting system details via SNMP.