Foundations Of Cybersecurity Flashcards

1
Q

Cybersecurity

A

The practice of ensuring confidentiality, integrity and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Actor

A

Any person or group who presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Playbook

A

A list of how to go through a certain detection, and what the analyst needs to look at in order to investigate those incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compliance

A

The process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Frameworks

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Controls

A

Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Posture

A

An organizations ability to manage its defense of critical assets and data and react to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internal Threat

A

A current or former employee, an external vendor or a trusted partner who poses a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Security

A

The practice of keeping an organizations network infrastructure secure from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured or set up correctly, and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud

A

A network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Programming

A

A process that can be used to create a specific set of instructions for a computer to execute tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transferable Skills

A

Communication, collaboration, analysis and problem solving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Technical Skills

A

Programming languages, Security Information and Event Management (SIEM) tools, and computer forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Information and Event Management (SIEM) Tools

A

Tools which collect and analyze log data or records of events such as unusual login behavior and support analysts ability to monitor critical activities in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intrusion Detection Systems (IDSs)

A

Used to monitor system activity and alerts for possible intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Personally Identifiable Information (PII)

A

Any information used to infer an individuals identity. (Ex- full name, D.O.B., address, phone number, email, IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Sensitive Personally Identifiable Information (SPII)

A

A specific type of PII that falls under stricter handling guidelines. (Ex- SSN, medical or financial information, biometric data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Computer Virus

A

Malicious code written to interfere with computer operations and cause damage to data and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Malware

A

Software designed to harm devices or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Social Engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CSIRTs

A

Computer Security Incident Response Teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Business Email Compromise (BEC)

A

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information in order to obtain a financial advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Spear Phishing

A

A malicious email attack that targets a specific user or group of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Whaling

A

A form of spear phishing. Threat actors target company executives to gain access to sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Smishing

A

The use of text messages to trick users in order to obtain sensitive information or to impersonate a known source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Worms

A

Malware that can duplicate and spread itself across system on its own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Ransomware

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Spyware

A

Malware that’s used to gather and sell information without consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Social Media Phishing

A

A threat actor collects detailed information about their target from social media sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Watering Hole Attack

A

A threat actor attacks a website frequently visited by a specific group of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

USB Baiting

A

A threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Physical Social Engineering

A

A threat actor impersonates an employee, customer or vendor to obtain unauthorized access to a physical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Reasons Social Engineering Is Effective

A

Authority, intimidation, consensus/ social proof, scarcity, familiarity, trust or urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CISSP

A

Certified Information Systems Security Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Name The 8 CISSP Security Domains

A

Security and Risk Management, Asset Security, Security Architecture and Engineering, Communications and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security

39
Q

Security and Risk Management

A

Defines security goals and objectives, risk mitigation, compliance, business continuity, and the law.

40
Q

Asset Security

A

Secures digital and physical assets. Related to the storage, maintenance, retention, and destruction of data.

41
Q

Security Architecture and Engineering

A

Optimizes data security by ensuring effective tools, systems, and processes are in place. Ex- firewall

42
Q

Communication and Network Security

A

Manage and secure physical networks and wireless communications.

43
Q

Identity and Access Management

A

Keeps data secure by ensuring users follow established policies to control and manage physical assets, like office spaces and logical assets, such as networks and applications. Ex- validating employees or setting up keycard access.

44
Q

Security Assessment and Testing

A

Conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities.

45
Q

Security Operations

A

Conducting investigations and implementing preventative measures. Ex- unknown device connects to the network

46
Q

Software Development Security

A

Uses secure coding practices, which are a set of recommended guidelines that are used to create secure applications and services.

47
Q

Password Attack

A

An attempt to access password secured devices, systems, networks, or data. Ex- Brute Force or Rainbow Table

48
Q

Physical Attack

A

A security incident that affects not only digital but also physical environments where the incident is deployed.

49
Q

Adversarial Artifical Intelligence

A

A technique that manipulates artificial intelligence and machine learning technology to conduct attacks more efficiently.

50
Q

Supply Chain Attack

A

Targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.

51
Q

Cryptographic Attack

A

Affects secure forms of communication between a sender and intended recipient.

52
Q

Advanced Persistent Threats (APTs)

A

Have significant expertise accessing an organizations network without authorization. Tend to research their targets in advance and can remain undetected for an extended period of time.

53
Q

Insider Threats

A

Abuse of their authorized access to obtain data that may harm an organization.

54
Q

Hacktivists

A

Threat actors that are driven by a political agenda.

55
Q

Hacker

A

Any person who uses a computer to gain access to computer systems, networks, or data.

56
Q

Authorized Hackers (Ethical Hackers)

A

Follow a code of ethics and adhere to the law to conduct organizational risk evaluations.

57
Q

Semi-Authorized Hackers (Researchers)

A

Search for vulnerabilities but don’t take advantage of the vulnerabilities they find.

58
Q

Unauthorized Hackers (Unethical Hackers)

A

Malicious threat actors who don’t follow or respect the law.

59
Q

Security Life Cycle

A

A constantly evolving set of policies and standards that define how an organization manages risks, follows established guidelines and meets regulatory compliance laws

60
Q

Purposes of Security Frameworks

A

Protecting PII, Securing Financial Information, Identifying Security weaknesses, managing organizational risks, aligning Security with business goals

61
Q

Components of Security Frameworks

A

Identifying and documenting security goals, setting guidelines to achieve security goals, implementing strong security processes, and monitoring and communicating results

62
Q

General Data Protection Regulation (GDPR)

A

A data protection law established to grant European citizens more control over their personal data

63
Q

CIA Triad

A

A foundational model that helps inform how organizations consider risk when setting up systems and security policies

64
Q

Confidentiality

A

Only authorized users can access specific assets or data

65
Q

Integrity

A

Data is correct, authentic and reliable

66
Q

Availability

A

Data is accessible to those who are authorized to access it

67
Q

Asset

A

An item perceived as having value to an organization

68
Q

NIST

A

National Institute of Standards and Technology

69
Q

NIST Cybersecurity Framework (CSF)

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk (Baseline to manage short and long term risks)

70
Q

Security Ethics

A

Guidelines for making appropriate decisions as a security professional

71
Q

Ethical Principles In Security

A

Confidentiality, Privacy Protections, and Laws

72
Q

Privacy Protection

A

Safeguarding personal information from unauthorized use

73
Q

Log

A

A record of events that occur within an organizations systems

74
Q

Network Protocol Analyzer (Packet Sniffers)

A

A tool designed to capture and analyze data traffic within a network

75
Q

Chain of Custody Playbook

A

The process of documenting evidence possession and control during an incident life cycle. (Who, what, where and why evidence was collected)

76
Q

Protecting and Preserving Evidence Playbook

A

The process of properly working with fragile and volatile digital evidence

77
Q

Order of Volatility

A

A sequence outlining the order of data that must be preserved from first to last

78
Q

Volatile Data

A

Data that may be lost if the device in question powers off

79
Q

Dashboard

A

A tool used to visually communicate information or data

80
Q

Linux

A

An open source operating system (publicly available)

81
Q

Structured Query Language (SQL)

A

A programming language used to create, interact with, and request information from a database

82
Q

Database

A

An organized collection of information or data

83
Q

Python

A

Used to perform tasks that are repetitive and time consuming and that require a high level of detail and accuracy

84
Q

Data Point

A

A specific piece of information

85
Q

Operating System

A

The interface between computer hardware and the user. Ex- Linux, macOS, Windows

86
Q

Command

A

An instruction telling the computer to do something

87
Q

Command Line

A

A text based user interface that uses commands to interact with the computers

88
Q

Web Vulnerability

A

A unique flaw in a web application that a threat actor could exploit

89
Q

Antivirus Software

A

A software program used to prevent, detect and eliminate malware and viruses (also called anti malware)

90
Q

Encryption

A

The process of converting data from a readable format to a cryptographically encoded format

91
Q

Cryptographic Encoding

A

Converting plaintext into secure ciphertext

92
Q

Plaintext

A

Unencrypted information

93
Q

Penetration Testing

A

The act of participating in a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications and processes.