Introduction to Cyber Security Flashcards

1
Q

What is Offensive Security

A

Offensive Security is the process of breaking into computer systems, exploiting software bugs, and finding loopholes to gain unauthorised access to them, before then recommending patches to fix the issues you used to gain this privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Defensive Security

A

Defensive security is the process of protecting an organizations network and computer systems by analysing and securing any digital threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two main tasks of Defensive Security?

A

Preventing Intrusion from occurring
Detecting Intrusion when it does occur and responding accordingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is Cyber Awareness related to Defensive Security

A

Training users about cyber security can help protect against many attack vectors targeting systems, such as phishing attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Documenting and Managing Assets aid Defensive Security

A

Documenting and Managing assets aids defensive security as the cyber professional hired to do the work knows what systems they are in charge of and how they can protect it properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Updating and patching systems help Defensive Security?

A

Updating and Patching systems help with defensive security since it makes sure that the systems are up to date with defences against known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the process of setting up preventative security settings aid Defensive Security?

A

Firewalls and Intrusion prevention systems (IPS) are important for defensive security as you can manage what goes in and out of a network, while Intrusion Prevention Systems can block attacks which match known attacking systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the presence of logging and monitoring devices aid Defensive Security

A

This aids with detection of malicious activities and intrusions, as well as recovering any damaged systems after an attack has stopped/been repelled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two main topics of Defensive Security?

A

Malware Analysis & Threat Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Security Operations Center?

A

The Security Operations Centre is a team of cyber professionals that monitor the network and system to detect malicious cyber security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the main areas of interest for the SOC?

A

Vulnerabilities, Policy Violations, Unauthorized Activity, Network Intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Threat Intelligence?

A

Threat Intelligence is analysing the job of the client to understand what threats you may be going up against, to try and give you a better idea on what attacks might occur (i.e. a Nation State hacker may be much more skilled than a Ransomware hacker).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Digital Forensics?

A

Digital Forensics is the application of science to investigate crimes and establish facts from analysing a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Incident Response?

A

Incident Response can usually refers to Cyber Attacks or Data breaches, although it can also be less major events such as misconfigurations, intrusion attempts & policy violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four major phases of Incident Response?

A

Preparation, Detection & Analysis, Containment, Post-Incident Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What areas does Digital Forensics focus on?

A

Digital forensics focuses on the analysis of File Systems, System Memory, System Logs & Network Logs.

14
Q

What occurs in the Containment, Eradication and Recovery Phase of Incident Response?

A

the Containment, eradication and recovery phase occurs when the incident is detected to stop it from affecting other systems, eliminating the incident, and recovering any lost files caused from the event.

14
Q

What is the Preparation Phase of Incident response?

A

The preparation phase of incident response is in charge of making sure a team is ready to combat any cyber attacks

14
Q

What is the Detection and Analysis phase of Incident Response?

A

The Detection and Analysis phase of incident response is where the team first detects an attack, and starts to analyse what the attack is attempting to do to better prevent any negative effects.

14
Q

What occurs in the Post-Incident Activity phase of Incident Response?

A

In the Post-Activity Phase, a report is produced, and any learned lessons are shared to defend against similar future events.

14
Q

What is Malware Analysis?

A

Malware Analysis is the analysis of any malicious software, where it be a virus, Trojan Horse, or ransomware

15
Q

What is the purpose of Malware Analysis?

A

Malware Analysis aims to learn about such malicious programs using various means, these can be inspecting the code of the malware without running it, or running it in a quarantined system so it is controlled.

16
Q
A