fundamentals of cyber securiy Flashcards

1
Q

what is cybersecurity?

A

processes, practices and technologies designed to protect networks, computers , programs and data from attack, damage or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

examples of cyber security threats

A

social engineering techniques
malicious code
weak and default passwords
misconfigured access rights
removable media
unpatched and/or outdated software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

explain unpatched software

A

application or systems that have not been patched or updated so have vulnerable security and are at risks to threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

explain malicious code

A

describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain social engineering techniques

A

art of manipulating people to give up confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

explain misconfigured access rights or removable media

A

when user accounts have incorrect permissions. The bigger problem from this could be giving people who are lower down the chain of command access to private information

these devices are small and easy to misplace or lose. …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is penetration texting and what is it used for

A

process of attempting to gain access to re scourges without knowledge of usernames, passwords and other means of access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

white box penetration test

A

stimulate a malicious insider who has knowledge of and possibly basic credentials for the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

black box penetration test

A

stimulate an external hacking or cyber warfare attack to test the cyber security software’s capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly