Intro Flashcards

1
Q

Cybersecurity

A

-the practice of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information
-CIA triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

-keeping important information secret so that only the right people can see it.
-keeping information confidential helps protect it from hackers or strangers who may want to change or steal it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

-making sure that information stays accurate and isn’t changed by accident or on purposes
-making sure that data stays correct and trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

-making sure that the information or services you need are always there when you need them
-keeping websites, apps, and computers running smoothly so that people can use them whenever they need them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk

A

the potential for harm or loss when a threat (hacker or malware) exploits a weakness in a system or network.
-a combination of threats and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat

A

the possibility of something bad happening (cyberattack)
-Ex: viruses & phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability

A

A weakness in the system that could be exploited by that threat
-Ex:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Control

A

setting rule and limits to protect information and systems.
-decide who can access certain files, websites, or apps.
-EX: passwords, firewalls, antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall

A

A protective wall around your computer or network that decides who can come in and who can’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing

A

a trick where attackers pretend to be someone you trust, like a company or a friend, to steal personal information such as passwords, credit card number or login details
-Ex: Fake email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

virus

A

a bad program that can sneak into your computer and cause problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

any software intentionally designed to cause damage to a computer, server, client, or computer network.
-Ex: Ransomware & Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware

A

malicious software that locks or encrypts files on a computer or network, making them inaccessible to the user and the attacker demands payment in exchange for the information
-Ex: WannaCry & Petya/NoPetya

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

A process that transforms readable date (plain text) into a unreadable formate (ciphertext) using a specific algorithm and encryption key.
-Ex: SSL/TSL & File Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lilkelihood

A

The probability or change that a specific threat or vulnerability will exploit a system or lead to a security incident.
-Key Points: Risk assessment, factors, risk calculation, & categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Impact

A

The magnitude of harm expected to result from the compromise of the CIA of a resource system.

17
Q

Cyber risk

A

The risk to a business due to the failure of a business function depended t on digital technologies

18
Q

Risk framing

A

Creates a risk management strategy that details how risks are assessed, responded to & monitored

19
Q

Assessing risk

A

Identifies, protists & estimates the risks to corporate assets

20
Q

Monitoring risk

A

Effectiveness of implementing risk controls & compliance focused measures

21
Q

Responding to Risk

A

Determines the appropriate approach to addressing an identified risk

22
Q

NIST - National Institute of Standards and Technology

A

Cybersecurity framework is a voluntary set of guidelines, standards and best practices
-5 Primary Functions: Identify (understanding what the risks are, what needs to be protected and managing those things), Protect (putting things in place to keep those things in place and protected), Detect (activities and procedures that are put in place to quickly identify and alert people of potential risks, Respond (taking action when an incident occurs to prevent or limit damage) & Recover (develop and put plans in place to get back to normal).

23
Q

Risk Management Framework

A

a structured approach used to identify, assess, and reduce risks to an organization’s digital systems.
-Identify: What things could go wrong
-Assess: How bad would it be it the thing(s) went wrong
-Develop a plan: How can the risks be reduced or managed?
-Implement the plan: Put the plan in action
-Monitor & Review: Keep and eye on the defenses. Update frequently.