Intro to Cybersecurity (2) Flashcards

1
Q

What are the four types of Computer Security?

A

Cybersecurity, Information Security, Application Security, Network Security

These categories help structure the approaches to securing different aspects of computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are considered assets in the context of security?

A

Hardware, Software, Data, People

Identifying and valuing these assets is crucial for effective protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define vulnerability in cybersecurity.

A

A weakness that can be exploited

Examples include flaws in design or implementation that threat actors can take advantage of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the C-I-A triad?

A

Confidentiality, Integrity, Availability

These are the three pillars of information security that govern practices for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does confidentiality mean in the C-I-A triad?

A

Assets are viewed by authorized people only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does integrity mean in the C-I-A triad?

A

The system ensures that assets can be modified only by authorized people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does availability mean in the C-I-A triad?

A

Data is accessible for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is authentication in cybersecurity?

A

The process of verifying that an identity matches the person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is accountability in cybersecurity?

A

The ability of the system to confirm that a sender cannot deny an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the four acts that can harm the CIA of computer assets.

A
  • Interception
  • Modification
  • Fabrication
  • Availability loss

Each act represents a potential threat to the confidentiality, integrity, and availability of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three basic actions a person or system can perform?

A
  • Viewing
  • Modifying
  • Using
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of threat is an Advanced Persistent Threat (APT)?

A

A threat from wealthy, organized, sophisticated hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is risk management in cybersecurity?

A

Controlling threats and using resources to minimize damages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What three elements do malicious hackers need to succeed?

A
  • Method
  • Opportunity
  • Motive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the method in the context of a successful cyber attack?

A

The skills and tools that hackers use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does opportunity refer to in a cyber attack?

A

The time and access available to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are controls and countermeasures?

A

Ways to counter threats and protect against them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the difference between identification and authentication?

A

Identification is recognizing a person, while authentication is proving who they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List three methods of authentication.

A
  • Knowledge (e.g., passwords)
  • Biometric (e.g., fingerprints)
  • Possession (e.g., identity badges)

Each method has its own strengths and weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a dictionary attack?

A

An attack using commonly used words or phrases to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a brute force attack?

A

An attack that guesses the password until the correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is credential stuffing?

A

An attack where stolen information from one website is used to access other websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are some advantages of using biometrics for authentication?

A
  • Less likely to be stolen
  • More convenient
  • Cannot be forgotten
  • Difficult to replicate

Biometrics offer a higher level of security compared to traditional methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are some problems associated with biometrics?

A
  • False positives
  • False negatives
  • Privacy concerns
  • Expensive to implement

These issues can hinder the widespread adoption of biometric systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is access control?

A

The process of giving or denying access to data or computer resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the four parts of access control?

A
  • Policy definition phase
  • Policy enforcement phase
  • Identification
  • Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the two types of access control?

A
  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Discretionary Access Control (DAC)?

A

User sets control to block or allow access to an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Mandatory Access Control (MAC)?

A

System admin controls access to objects, with no user changes allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a digital certificate?

A

An authentication method that verifies a user based on location, device status, or user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is cryptography?

A

The method of encrypting data to hide it and only allow certain people to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is encryption?

A

The process of encoding a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is decryption?

A

The reverse process of encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is symmetric key encryption?

A

A method where only one key is used to encrypt and decrypt data.

35
Q

What is asymmetric key encryption?

A

A method using a public key for encryption and a private key for decryption.

36
Q

What is malware?

A

Malicious code or programs meant to harm a system.

37
Q

What is a virus in the context of malware?

A

A program that infects other programs by modifying them.

38
Q

What is a worm in malware terms?

A

A type of malware that replicates itself to spread.

39
Q

What is a trojan horse?

A

A type of malware that appears safe but hides malicious code.

40
Q

What is a keylogger?

A

Software or hardware that records every keystroke made by a user.

41
Q

What is the purpose of testing software for security?

A

To ensure the software functions correctly and securely.

42
Q

What is the least privilege principle?

A

Users should have only the rights they need for their job.

43
Q

What does ‘separation of privilege’ mean?

A

Access should require two conditions to be approved.

44
Q

What is a man-in-the-middle attack?

A

An attack that secretly intercepts communication between two parties.

45
Q

What is a drive-by download?

A

An attack that automatically downloads malicious software without user consent.

46
Q

What is the man-in-the-middle attack?

A

An attack that allows an unauthorized party to intercept and potentially alter communication between two parties.

47
Q

What can malware do with authentication data?

A

Malware can reuse previously used authentication data.

48
Q

What is a one-time password?

A

A password that is valid for only one login session or transaction.

49
Q

Why is continuous authentication beneficial?

A

It allows ongoing verification of a user’s identity but requires proper setup.

50
Q

What is the importance of HTTPS?

A

It ensures secure communication over a computer network.

51
Q

What is a digital certificate?

A

An electronic file used to verify the identity of a party online.

52
Q

What information does a digital certificate contain?

A

It contains the name of the entity, the issuer, and the expiration date.

53
Q

What does a fake website aim to achieve?

A

To deceive users by appearing legitimate while conducting malicious activities.

54
Q

What can attackers do to legitimate websites?

A

Attackers can change or modify a legitimate website.

55
Q

What are common motivations for attacks?

A
  • Prove a point
  • Embarrass the victim
  • Make a political or ideological statement
  • Gain attention or respect
  • Simplicity of execution
56
Q

What is phishing?

A

An email-based attack aimed at tricking individuals into providing sensitive data.

57
Q

What is a MAC address?

A

A unique identifier assigned to a network interface for communication on a network.

58
Q

What is a packet sniffer?

A

A tool that captures and analyzes packets of data on a network.

59
Q

What is the OSI model?

A

A conceptual framework used to understand and implement network communication.

60
Q

What is the role of the application layer in the OSI model?

A

It interacts with end-user software and provides network services.

61
Q

What is the function of the presentation layer?

A

It prepares data for the application layer and manages encoding, encryption, and compression.

62
Q

What does the session layer do?

A

It manages sessions between applications.

63
Q

What is the purpose of the transport layer?

A

To maintain data transfer between two networks.

64
Q

What does the network layer do?

A

It routes data and determines the best path for it to travel.

65
Q

What is the role of the data link layer?

A

It facilitates data transfer between devices on the same network.

66
Q

What does the physical layer manage?

A

It manages the physical connection between devices and transmits raw data.

67
Q

What are the three key principles of information security?

A
  • Confidentiality
  • Integrity
  • Availability
68
Q

What is a DoS attack?

A

An attack that aims to make a network resource unavailable by overwhelming it with requests.

69
Q

What is wiretapping?

A

The interception of communication, usually for malicious purposes.

70
Q

What is DNS spoofing?

A

An attack where fake DNS records are created to redirect users to malicious sites.

71
Q

What is a DDoS attack?

A

A distributed denial-of-service attack that uses multiple compromised systems to flood a target.

72
Q

What is a bot in the context of network security?

A

A compromised computer that is controlled remotely to perform malicious tasks.

73
Q

What is the function of a firewall?

A

To filter incoming and outgoing network traffic based on predetermined security rules.

74
Q

What are common types of firewalls?

A
  • Packet-filtering firewalls
  • Stateful inspection firewalls
  • Proxy firewalls
75
Q

What does a VPN do?

A

Provides a secure communication tunnel for data transmission between networks.

76
Q

What is Tor onion routing?

A

A technique for anonymous communication that encapsulates messages in layers of encryption.

77
Q

What is blacklisting?

A

A method of blocking access to specific IP addresses or domains.

78
Q

What is an IDS?

A

An Intrusion Detection System that monitors network traffic for suspicious activity.

79
Q

What are the two types of IDS?

A
  • Signature-based
  • Anomaly-based
80
Q

What does an IPS do?

A

An Intrusion Prevention System that actively blocks or prevents attacks.

81
Q

What is the purpose of encryption in data security?

A

To protect data being transferred from unauthorized access.

82
Q

What is the importance of updating security software?

A

To protect against new vulnerabilities and threats.

83
Q

Fill in the blank: A malicious program is installed without the user knowing, known as _______.

84
Q

True or False: HTTPS is less secure than HTTP.