Essential Security Principles Flashcards
What term refers to the combined sum of all potential threat vectors and defense in debt security?
Attack surface
You are completing a college admissions application online. When navigating to the next page in the application, the website becomes unresponsive and appears to crash. You attempt to refresh the admissions page, but you get a generic browser error and cannot access your application. What part of the CIA triad has been compromised?
Availability
What is the key characteristic of a cyber security defense-in-depth definition?
Multiple overlapping layers of security
You receive an email from your teacher that has a link to a class poll for a pizza party. You click the link which takes you to the school portal. To log in later, you discovered this was a phishing email and your credentials were stolen.Which part of the CIa triad was compromised in this attack?
Confidentiality
Which part of the CIA triad is exploited when shoulder surfing occurs?
Confidentiality
Which part of the CIA triad is exploited when shoulder surfing occurs?
Confidentiality
A major power surge occurs in the middle of making authorized changes to the company payroll server, which results in equipment failure. The equipment is replaced and the data is restored from a previous good backup, which part of the CIA triad was preserved?
Availability
What is the term to describe a weakness in a computer device system or network?
Vulnerability
_______ is the possibility of an attack
Threat
_______is a weakness in the system.
Vulnerability
______is an actual attack.
Exploit
________is a program that gives attackers a way to regain access after an attack.
Rootkit
_________ is a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities.
Attack vector
________ is a network of devices infected with malicious software.
Botnet
________is an attack used to access encrypted data.
Cryptographic attack
_______ usually establishes a barrier between a trusted internal network and an untrusted external network.
Firewall
_______ is determined by the likelihood or potential of a threat being carried out.
Risk
_______ is a type of malware.
Cryptoworm
________ is malicious software that prevents a company from accessing its data.
Ransomware attack
________is a code that takes advantage of a software vulnerability.
Exploit
A potential malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information.
Threat
A pathway or method used by a hacker to illegally access a network or computer.
Attack vector
An attack, designed to find and take advantage of a computer weakness usually from malicious purposes.
Exploit
A weakness found in a computer system, which has the potential to be accessed in order to compromise the system.
Vulnerability
What type of attacker mostly uses existing computer code to launch cyber attacks.
Script kiddie
During a security breach, cyber criminals exposed sensitive corporate data, which component of the
CIA triad, was violated?
Confidentiality
While downloading an app that appears legitimate, you accidentally install malware that contains a key logger, which element of the CIA Triad, has been compromised?
Confidentiality