Foundations of Cybersecurity Flashcards
Module Two
What is malware?
Software designed to harm devices or networks.
Which security event resulted in one of the largest known data breaches of sensitive information, including customers’ social security and credit card numbers?
Equifax breach.
What is the term for exploiting human error to gain access to private information?
Social engineering.
What are the likely consequences of a phishing attack?
Employees inadvertently revealing sensitive data, malicious software being deployed.
Which tasks are part of the security and risk management domain?
Business continuity, defining security goals and objectives, compliance.
Optimizing data security by ensuring effective tools, systems, and processes are in place falls under which domain?
Security architecture and engineering.
Ensuring proper storage, maintenance, and retention of an organization’s data is related to which domain?
Asset security.
Conducting, collecting, and analyzing data, as well as conducting security audits, falls under which domain?
Security assessment and testing.
Issuing a keycard to a new employee falls under which domain?
Identity and access management.
Investigating unknown devices connected to an internal network, conducting investigations, and implementing preventive measures are part of which domain
Security operations.
What is adversarial artificial intelligence (AI)?
A technique that manipulates AI and machine learning technology to conduct attacks more efficiently.
What is Business Email Compromise (BEC)?
A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage.
What is a computer virus?
Malicious code written to interfere with computer operations and cause damage to data and software.
What is a cryptographic attack?
An attack that affects secure forms of communication between a sender and intended recipient.
Who is a hacker?
Any person who uses computers to gain access to computer systems, networks, or data.