Information Assurance - Pointers Flashcards

1
Q
  • kind of electronic signatures but harder to obtain.
  • They follow a specific protocol, called Public Key Infrastructure(PKI) and require a certificate issued by Certificate Authority(CA) that can prove the identities of signers and validate the signatures.
  • hold higher levels of trustworthiness and authenticity than eSignatures. So they are often used for more significant transactions.
A

Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • named as online signatures are a broader concept than digital signatures.
  • use digital symbols to give legal authorization or approval for online transactions and agreements, which are the virtual alternatives to ink-on-paper signatures.
A

Electronic signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

common cybersecurity threats

A
  1. Malware Attacks
  2. Phishing Scams
  3. Data Breaches
  4. Ransomware
  5. Social Engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

can go undetected for a prolonged period, leading to continuous exploitation of the compromised system

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to any software intentionally designed to cause damage to a computer, server, client, or computer network

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware includes:

A
  1. viruses,
  2. worms,
  3. Trojans,
  4. ransomware,
  5. spyware
  6. adware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Once malware enters a system, it can

A
  1. corrupt files,
  2. steal sensitive data,
  3. gain unauthorized access to the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The potential impact of a malware attack is significant

A
  1. system damage
  2. data loss
  3. severe financial losses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

are fraudulent attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication

A

Phishing Scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

typically involves a fake email or website that mimics a reputable organisation.

A

Phishing Scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The potential impact of a successful phishing scam

A
  1. identity theft,
  2. financial loss
  3. unauthorized access to systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data breaches can lead to a wide range of damaging effects

A
  1. financial loss,
  2. brand reputation damage,
  3. intellectual property loss,
  4. potential legal penalties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware can cause

A
  1. halt operations until the issue is resolved
  2. cost of the ransom demanded
  3. severe financial losses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The impact of social engineering

A
  1. data breaches,
  2. financial loss,
  3. compromise in personal or business integrity.
17
Q

Common Vulnerabilities that exists in Cybersecurity

A
  1. Weak or stolen credentials
  2. Lack of encryption
  3. Misconfigurations
  4. Out-of-date software
  5. Zero day
  6. Poor input sanitization
  7. Insider threats
  8. Unauthorized access
  9. Vulnerable API
18
Q
  • Many people fail to create strong and unique passwords for each of their accounts.
  • They often resort to poor password habits, such as reusing the same passwords across multiple accounts and creating weak ones that are easy to remember.
  • Cybercriminals take advantage of weak login credentials and launch cyber attacks like brute force attacks that can steal these weak passwords.
A

Weak or stolen credentials

19
Q

If an organization doesn’t adequately encrypt its data, cybercriminals can intercept transmitted data, steal it and possibly use it to gain unauthorized access or plant malicious code, such as ransomware.

A

Lack of encryption

20
Q
  • occur when network assets have vulnerable settings or disparate security controls.
  • Systems that require manual configuration can have errors and gaps if improperly configured.
  • Cybercriminals look for these misconfigurations to exploit and gain unauthorized access
A

Misconfigurations

21
Q
  • Cybercriminals look for any bugs or flaws within software.
  • They can exploit these flaws to gain unauthorized access and steal any sensitive data.
  • However, updating software regularly will patch most flaws or bugs, particularly known vulnerabilities that cybercriminals are most likely to exploit.
  • If an organization is running out-of-date software, it is susceptible to cyber threats.
A

Out-of-date software

22
Q
  • vulnerabilities are software vulnerabilities that organizations and software vendors don’t yet know exist; therefore, they haven’t been patched.
  • dangerous because there is no defense against them until someone discovers them.
  • That someone can be an ethical security researcher – or a threat actor.
A

Zero day

23
Q
  • process of checking and filtering input data to ensure it does not contain malicious code that could damage a system.
  • Cybercriminals look for systems with poor input sanitization to inject malicious code that grants them access.
A

Poor input sanitization

24
Q

When users fall for phishing attacks or practice poor password hygiene, cybercriminals can compromise their login credentials. After compromising a user’s login credentials, cybercriminals can gain unauthorized access to an organization’s network.

A

Human error

25
Q
  • occur within an organization when current or former employees, partners, contractors or vendors either intentionally or unintentionally put sensitive data and systems at risk.
  • This can be the result of negligent insiders who practice poor cyber hygiene or malicious insiders who steal sensitive data for their own benefit.
A

Insider threats

26
Q
  • Organizations give their employees privileged access to resources needed to perform their jobs.
  • accidentally give some employees more access and permissions than they need.
  • This can create security risks if an employee abuses these permissions or their account gets compromised by a threat actor.
A

Unauthorized access

27
Q

Best Practices to strengthen the cybersecurity measures

A
  1. Use strong passwords and multi-factor authentication.
  2. Security-Based Software
  3. Wi-Fi Security
  4. Firewalls and Content Filtering
  5. Patch Updates
  6. Staff Education
  7. Control access to sensitive information.
  8. Monitor third-party users and applications.
28
Q
  • An Application Programming Interface (API) is a digital interface that enables applications to communicate with each other over the internet or a private network.
  • Since APIs are assets with public IP addresses, cybercriminals can target and exploit them if they are not properly secured.
A

Vulnerable API

29
Q
  • Regular internet users might be familiar with password requirements such as using uppercase and lowercase letters, symbols, and numbers to create a strong password.
  • Company systems and tools tend to have similar requirements. Some organizations might even provide complicated passwords to users to ensure maximum security.
A

Use strong passwords and multi-factor authentication

30
Q

Applying security to a business’s Wi-Fi network prohibits unauthorized people not associated with the company from gaining access to the company’s website or its systems. Cybersecurity professionals can even take this one step further and hide the network from outside entities

A

Wi-Fi Security

31
Q

A security program like antivirus software provides an initial layer of defense that cybercriminals must penetrate to gain access to a system.

A

Security-Based Software

32
Q

Firewalls allow cybersecurity professionals to efficiently analyze their company’s network traffic. This could make it easier for them to spot unusual or suspicious behaviors.

A

Firewalls and Content Filtering

33
Q
  • Periodic training of employees on topics such as how to spot potential phishing schemes and what the proper software configurations are can help mitigate the threats posed by individuals unwittingly exposing the company’s systems.
  • This can include education on work-from-home safety practices for businesses with employees who work remotely
A

Staff Education

34
Q
  • In every organization, the IT team is responsible for managing who gets access to information, and that includes controlling access to security passwords, highly classified information, and more.
  • At times, only a handful of people can be entrusted with the company’s financial data and trade secrets. Most employees are granted the fewest access rights possible, and sometimes given access only upon request or during specific circumstances.
A

Control access to sensitive information

35
Q
  • Regularly scheduling patches helps to keep a program optimized.
  • It also ensures that cybersecurity professionals regularly analyze the performance of the system or software to uncover any unexpected vulnerabilities.
A

Patch Updates

36
Q
  • Third-party users with access to your organization’s systems and applications have the ability to steal your data, whether or not it is intentional. Either way, they can cause cybersecurity breaches.
  • By monitoring user activity, taking care to restrict access to sensitive information, and providing one-time passwords, you can detect malicious activity and prevent breaches from occurring.
A

Monitor third-party users and applications.