Introduction Flashcards
What is Cybersecurity
Cybersecurity is the ongoing effor to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm.
The 3 Levels of Cybersecurity?
- Personal
- Organizational
- Government
What are the most common types of Identity Theft?
- Medical Theft
- Banking
What is the purpose of cyberwarfare?
To gather compromising information or to impact infraestructure.
What is the Behaviour-based approach to CyberSecurity?
Behavior-based security is a form of threat detection that involves capturing and analyzing a flow of communication in order to identify any anomalies and changes in nonormal patterns.
What is the 5 steps of Pentesting?
- Planning
- Scanning
- Gaining Access
- Maintaining access
- Analysis and reporting
What is the main goal of Netflow?
Establish baseline behaviors in more than 90 attributes, such as source and destination IP address.
What CSIRT Stands for?
Team
Computer Security Incident Response Team
What FIRST Stands for?
Forum
Forum of Incident Response and Security Team
What NSIE Stands for?
Information Exchange
National Safety Information Exchange
What DSIE Stands for
Information Exchange
Defense Security Information Exchange
What DNS-OARC stands for?
Research Center
DNS Operations Analysis and Research Center.
What SIEM stands for?
Cisco’s approach tools
Security Information and Event Management
What is the main goal of SIEM?
Facilitate early detection of cyber attacks
How SIEM Works?
Collecting and Analyzing Security Alerts, Logs and other data (Real time and historic) from security devices on the network.
What DLP Stands for?
Cisco’s approach tools
Data Loss Prevention
What is the main goal of DLP Systems?
Cisco’s approach tools
Stop sensitive data from being stolen or escaping a network.
How DLP systems works?
Cisco’s approach tools
Monitoring and protecting data in three diferent states:
* In use
* In motion
* At rest
What ISE stands for?
Identity Services Engine
What tool can be used to provide a list of Open Ports on Network Devices?
Nmap
What name is given to a device that controls or filters traffic going in or out of the network?
Firewall
What tool can identify malicious traffic by comparing packet contents to known attack signatures?
Intrusion Detection System (IDS)
What is the correct definition of risk management?
Identifying and assessing risk to determine the severity of threats
“With careful planning and consideration, some risks can be completely eliminated”
Is that statement true or false?
False
What’s the difference between a Hacker and a Cybersecurity Professional?
Cybersecurity Professionals must work within legal boundaries.
What are On-path attacks?
Attacks in wich the attackers places themselves between two devices.