Introduction And Cybersecurity Fundamentals Flashcards

1
Q

What is the practice of protecting information by mitigating information risk? it also involves safeguard data from unauthorized access disclosure, alteration, and destruction.

A

Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the CIA try stand for?

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This ensures that sensitive information is only accessible to those who are authorized to view

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This maintains the accuracy and consistency of data throughout its life. Cycle data should be stored and transferred as intended.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This ensures that information and resources are available to authorize users whenever they are needed. This includes maintaining system of time preventing disruption to access.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This refers to the overall security status and readiness of an organization

A

Security Posturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the main components of security posturing?

A

Assessment, planning, implementation , monitoring, adaptation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This position overseas the entire security strategy of the organization, ensuring that all aspects of security are learned with business objectives

A

Chief security officer (CSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This position focuses on the protection of information, assets, developing and implementing information, security policies, and practices

A

Chief information security officer (CISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These positions primarily focus on handling policy enforcement

A

Managerial, technical, operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerability

A

A weakness or flaw in the system software process that can be exploited by the actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat

A

Any potential danger that can exploit a vulnerability to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk

A

The combination of likelihood that a threat will exploit a vulnerability and the impact it would have a measure of a potential harm to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threats can be classified as?

A

Internal, external, malicious, unintentional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This component within security posturing involves developing strategies and policies to address identified risk and improve security

A

Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This component of security posturing deploy security measures such as firewalls, encryption, and access measures

A

Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This key component of security posturing evaluate the current security measures and identifies potential

A

Assessment

18
Q

This component within security posturing updates and refines security measures based on new interest, technical advancements, and changes in organizations need

A

Adaptation

19
Q

——— is about how prepared and protected an organization is against cyber threats and involves assessing current security planning improvements, implementing protective measures modeling for threats and adapting to new risks and changes. This approach helps keep the organization, data system, and infrastructure safe.

A

Security posture

20
Q

————— are malicious hackers who illegally exploit vulnerabilities for personal gain or to cause harm

21
Q

These ethical hackers work to strengthen the organization’s security (internal threat with positive intentions)

22
Q

What does APTs stand for?

A

Advanced Persistent Threats

23
Q

These are highly skilled and well funded cyber threats often lead to government agencies. These targeted attacks are aimed at espionage or gaining strategic advantages, such as stealing sensitive information or disrupting rivals

24
Q

The route through which threat actors gain unauthorized access to systems or data

A

Attack vectors

25
Q

———- is crucial for understanding and improving the security of a network
Helps check and improve network security by setting a baseline of secure configurations and settings for devices

A

Vulnerability assessment

26
Q

This aspect ensures that people cannot deny their actions related to data, helping maintain accountability

A

Non-repudiation

27
Q

Individuals or groups that pose a danger to cyber security with varying motivations and capabilities

A

Threat actors

28
Q

These groups are often associated with government agencies, such as military or intelligence services. They are well funded, and highly skilled.

A

State-backed groups

29
Q

Gathering sensitive information often for national security or economic advantage

30
Q

Hackers who may assist an organization but operate without official authorization, sometimes crossing legal boundaries

31
Q

Inexperienced individuals who use existing tools and scripts to launch basic cyberattacks to promote their agenda

A

Script Kiddies

32
Q

Group of hackers united by a common cause, often political or social, to promote their agenda

A

Hacktivists

33
Q

Ethical hackers working to strengthen the organization’s security/ positive intentions

34
Q

Groups who operate across multiple legal jurisdictions, making them difficult to prosecute l. Motivated by profit through illegal activities such as ransomware, fraud and data theft

A

Criminal groups

35
Q

Engage in cyber espionage to gain a competitive edge

A

Competitors

36
Q

Threats that originate from within the organization that are particularly dangerous

A

Insider threats

37
Q

What types of insider threat actors are there and the difference between them?

A

Malicious Insider Threat- motivated by sabotage, financial gain or gaining business advantage. Individuals who have or have had authorized access

Unintentional Insider Threat- occurs when employees accidentally compromise security, often due to weak policies and procedures, weak adherence, lack of training and shadow IT

38
Q

Common attack vectors

A

Physical access to device
Infected USB drives or portable devices
Phishing emails
Attacking wireless networks
Compromising third-party vendors
Exploiting web applications or social media
Targeting cloud services with weak security

39
Q

Vulnerability Assessment check….

A

Users
Device Status
Network Settings
Outside Connections

40
Q

What does SLA and NDA stand for

A

Service level agreement
Non-disclosure agreements