Foundations of Cyber Security-Week One Key Terms Flashcards

1
Q

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

A

Cyber Security (Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A-Focuses on monitoring networks for breaches

B-help develop strategies to secure an organization and research information technology (IT) security trends to remain alert and informed about potential threats.

C-Works to prevent incidents

A

Cyber Security Analysts/ Security Analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the process of adhering to internal standards and external regulations, and enables organizations to avoid fines and security breaches.

A

COMPLIANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

guidelines used for building plans to help mitigate risks and threats to data and privacy

A

SECURITY FRAMEWORKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

used with security frameworks to establish a strong security posture

safeguards designed to reduce specific security risks.

A

SECURITY CONTROLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

STRONG _________leads to lower risk for the organization.

organization’s ability to manage its defense of critical assets and data and react to change

A

SECURITY POSTURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-Any person or group who presents a security risk.
- Risk can be related to computers, applications, networks, and data.

A

Threat actor or Malicious attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

At times _______ threats are accidents.

Can be a current or former employee, an external vendor, or a trusted partner who poses a security risk.

Other times, the __________ _______ actors intentionally engage in risky activities, such as unauthorized data access.

A

Internal Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

practice of keeping an organization’s network infrastructure secure from unauthorized access.

Includes data, services, systems, and devices that are stored in an organization’s network.

A

NETWORK SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.

The ________ is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet

the process of ensuring that assets stored in the ______ are properly configured, or set up correctly, and access to those assets is limited to authorized users.

A

CLOUD /CLOUD SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A process that can be used to create a specific set of instructions for a computer to execute tasks.

A

PROGRAMMING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

skills from other areas of study or practice that can apply to different careers

A

TRANSFERABLE SKILLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

apply to several professions, as well; however, they typically require knowledge of specific tools, procedures, and policies.

A

Technical Skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

use of digital communications to trick people into revealing sensitive data or deploying malicious software.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

A

Business Email Compromise (BEC)

17
Q

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source

A

Spear phishing

18
Q

form of spear phishing. Threat actors target company executives to gain access to sensitive data.

A

Whaling

19
Q

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

A

Vishing

20
Q

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

A

Smishing

21
Q

software designed to harm devices or networks. There are many types of

A

Malware

22
Q

Malicious code written to interfere with computer operations and cause damage to data and software.

A

Viruses

23
Q

that can duplicate and spread itself across systems on its own. In contrast to a virus, _______ does not need to be downloaded by a user. Instead, it self-replicates and spreads from an already infected computer to other devices on the same network.

A

WORM

24
Q

attack where threat actors encrypt an organization’s data and demand payment to restore access.

A

Ransomeware

25
Q

used to gather and sell information without consent. _________ can be used to access devices. This allows threat actors to collect personal data, such as private emails, texts, voice and image recordings, and locations.

A

Spyware

26
Q

A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.

A

Social media phishing:

27
Q

: A threat actor attacks a website frequently visited by a specific group of users.

A

Watering hole attack

28
Q

A threat actor strategically leaves a malware ______ stick for an employee to find and install, to unknowingly infect a network.

A

USB baiting

29
Q

: A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.

A

Physical social engineering