Foundations of Cybersecurity Flashcards

1
Q

Compliance

A

The process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security frameworks

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security controls

A

Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat actor

A

Aka, a malicious attacker. Any person or group who presents a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal threat

A

A current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, this threat is accidental.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud security

A

The process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Programming

A

A process that can be used to create a specific set of instructions for a computer to execute tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybersecurity (or security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls under stricter handling guidelines. E.g. SS # or credit card information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Technical skills

A

Skills that require knowledge of specific tools, procedures, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat

A

Any circumstance or event that can negatively impact assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transferable skills

A

Skills from other areas that can apply to different careers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the most common types of phishing attacks?

A

Business Email Compromise (BEC), Spear phishing, Whaling, Vishing, and Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Business Email Compromise (BEC)

A

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Spear phishing

A

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Whaling

A

A form of spear phishing. Threat actors target company executives to gain access to sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Smishing

A

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Malware

A

Software designed to harm devices or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the most common types of malware?

A

Viruses, Worms, Ransomware, and Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Viruses

A

Malicious code written to interfere with computer operations and cause damage to data and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Worms

A

Malware that can duplicate and spread itself across systems on its own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Ransomware

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Spyware

A

Malware that’s used to gather and sell information without consent. This type of malware can be used to access devices. This allows threat actors to collect personal data, such as private emails, texts, voice and image recordings, and locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Phishing, Smishing, Vishing, Spear phishing, Whaling, Social media phishing, Business Email Compromise (BEC), Watering hole attack, USB (Universal Serial Bus) baiting, and Physical social engineering.

A

What are the most common types of social engineering attacks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does CISSP stand for?

A

Certified Information Systems Security Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communications and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security
A

What are the eight CISSP security domains?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Password attack

A

An attempt to access password-secured devices, systems, networks, or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the two common forms of password attacks?

A

Brute force and Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Physical attack

A

A security incident that affects not only digital but also physical environments where the incident is deployed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are some of the most common examples of physical attacks?

A

Malicious USB cable, Malicious flash drive, and Card cloning and skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Adversarial artificial intelligence

A

A technique that manipulates
artificial intelligence and machine learning technology to conduct attacks more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Supply-chain attack

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Cryptographic attack

A

An attack that affects secure forms of communication between a sender and intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are some forms of cryptographic attacks?

A

Birthday, Collision, and Downgrade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Advanced persistent threats (APTs)

A

Those who have significant expertise accessing an organization’s network without authorization.

42
Q

Insider threats

A

Those who abuse their authorized access to obtain data that may harm an organization.

43
Q

What are 4 potential intentions and motivations of Insider Threats?

A

Sabotage, Corruption, Espionage, and Unauthorized data access or leaks

44
Q

Hacktivist

A

A person who uses hacking to achieve a political goal.

45
Q

What are 4 potential goals of a hacktivist?

A

Demonstrations, Propaganda, Social change campaigns, Fame

46
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data.

47
Q

What does the CIA triad stand for?

A

Confidentiality, Integrity, and Availability

48
Q

Protected Health Information (PHI)

A

Relates to the past, present, or future physical or mental health or condition of an individual, whether it’s a plan of care or payments for care.

49
Q

Security ethics

A

Guidelines for making appropriate decisions as a security professional.

50
Q

Confidentiality

A

The idea that only authorized users can access specific assets or data.

51
Q

Privacy protection

A

Safeguarding personal information from unauthorized use.

52
Q

Laws

A

Rules that are recognized by a community and enforced by a governing entity.

53
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

A U.S. federal law established to protect patients’ health information, also known as PHI, or protected health information.

54
Q

Asset

A

An item perceived as having value to an organization.

55
Q

Availability

A

The idea that data is accessible to those who are authorized to access it.

56
Q

Confidentiality, integrity, availability (CIA) triad

A

A model that helps inform how organizations consider risk when setting up systems and security policies.

57
Q

Integrity

A

The idea that the data is correct, authentic, and reliable.

58
Q

What does NIST CSF stand for?

A

National Institute of Standards and Technology Cyber Security Framework

59
Q

National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.

60
Q

Security architecture

A

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats.

61
Q

Security governance

A

Practices that help support, define, and direct security efforts of an organization.

62
Q

Security information and event management (SIEM) tool

A

An application that collects and analyzes log data to monitor critical activities in an organization.

63
Q

Log

A

A record of events that occur within an organization’s systems.

64
Q

Network protocol analyzer

A

Aka packet sniffer. A tool designed to capture and analyze data traffic in a network.

65
Q

Playbook

A

A manual that provides details about any operational action, such as how to respond to a security incident.

66
Q

What are two types of playbooks?

A

Chain of Custody and Protecting and Preserving Evidence playbooks

67
Q

Order of volatility

A

A sequence outlining the order of data that must be preserved from first to last.

68
Q

Automation

A

The use of technology to reduce human and manual effort in performing common and repetitive tasks.

69
Q

Structured Query Language (SQL)

A

Used to create, interact with, and request information from a database.

70
Q

Database

A

An organized collection of information or data.

71
Q

Data point

A

A specific piece of information.

72
Q

Operating system

A

The interface between computer hardware and the user.

73
Q

Linux

A

An open-source operating system.

74
Q

Command

A

An instruction telling the computer to do something.

75
Q

Command-line interface (CLI)

A

A text-based user interface that uses commands to interact with the computer.

76
Q

Web vulnerability

A

A unique flaw in a web application that a threat actor could exploit by using malicious code or behavior, to allow unauthorized access, data theft, and malware deployment.

77
Q

Antivirus software

A

A software program used to prevent, detect, and eliminate malware and viruses.

78
Q

Intrusion detection system (IDS)

A

An application that monitors system activity and alerts on possible intrusions.

79
Q

Encryption

A

The process of converting data from a readable format to a cryptographically encoded format.

80
Q

Cryptographic encoding

A

Converting plaintext into secure ciphertext.

81
Q

Plaintext

A

Unencrypted information.

82
Q

Secure ciphertext

A

The result of encryption

83
Q

Penetration testing

A

Aka, pen testing. The act of participating in a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes.

84
Q

Protecting and preserving evidence

A

The process of properly working with fragile and volatile digital evidence.

85
Q

Active packet sniffing

A

A type of attack where data packets are manipulated in transit.

86
Q

Botnet

A

A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder”.

87
Q

Denial of service (DoS) attack

A

An attack that targets a network or server and floods it with network traffic.

88
Q

Distributed denial of service (DDoS) attack

A

A type of denial of service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic.

89
Q

Internet Control Message Protocol (ICMP)

A

An internet protocol used by devices to tell each other about data transmission errors across the network.

90
Q

Internet Control Message Protocol (ICMP) flood

A

A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server.

91
Q

IP spoofing

A

A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.

92
Q

On-path attack

A

An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit.

93
Q

Packet sniffing

A

The practice of capturing and inspecting data packets across a network.

94
Q

Passive packet sniffing

A

A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network.

95
Q

Ping of death

A

A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is larger than 64KB.

96
Q

Replay attack

A

A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time.

97
Q

Smurf attack

A

A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets.

98
Q

Synchronize (SYN) flood attack

A

A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets.

99
Q

Backdoor attack

A

Weaknesses intentionally left by programmers or system and network administrators that bypass normal access control mechanisms.

100
Q
A