Implications of Misuse and Cybersecurity. Flashcards

1
Q

What is Cybersecurity

A

cybersecurity is the protection of computer systems and networks from digital threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a security threat

A

an act that leads to data loss, data corruption or data theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who are the people targeted by computer misuse and cyber attacks

A

Government
Organization
Individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List 2 sources of security threats

A

Primary sources of threats are employees/insiders, malicious hackers, natural disasters, foreign adversaries, and hostile attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List 3 jobs related to cybersecurity

A

Cyber Police
Ethical Hacker
Penetration Tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is computer misuse?

A

entering a computer system without permission (hacking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability

A

A flaw or weakness in a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Countermeasure

A

an action, device, procedure, or technique that reduces a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a security threat

A

a malicious act that aims to corrupt or steal data or disrupt an organization’s systems or the entire organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data integrity

A

the accuracy and consistency of data stored in a database, data warehouse etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Security

A

the process of protecting data from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Data Security

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

4 categories of physical data security

A

prevent unauthorized access
backup and recovery
distributed distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Preventing Unauthorized Access

A

Burglar Proof & locks
security guards
biometric devices
intrusion detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software-Based data security

A
Passwords
audit trails & access logs
encryption
firewalls
anti-virus software
17
Q

Categories of Malware

A

virus
worm
ransomware
trojan