Introduction to Cybersecurity Flashcards

1
Q

Assets

A

An asset is any object(tangible or intangible) that is considered valuable to an individual or group of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Critical Infrastructure
Blue Team

A

Will constantly perform tests and analysis using security monitoring programs, such as SIEM, and methods such as threat hunting, to identify security flaws and verify that the most effective security measures have been deployed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Critical Infrastructure
Red Team

A

Will constantly evaluate security levels of the infrastructure by trying to exploit the many security measures that are implemented in the organization, including using Social Engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Incidence Response

A

Also known as the Blue Team, will create a playbook that contains many scenarios, each scenario will have the best way to approach the situation with the attempt to limit damages to an infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SOC

A

Security Operation Center is a facility responsible for monitoring, preventing, detecting, investigating, and responding to cyber threats 24/7 to maintain safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Operation Center goals

A

> Detect the signs of a cyberattack
prevent before it happens
isolate an attack
Once isolated perform the Incident Response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Operation Centers within an Organization

A

Organizations need SOC teams to prevent, identify, and remedy attacks as quickly as possible and limit damages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Operation Center:
Blue Team Aspects

A

Cybersecurity experts that aim to safeguard an organization against cyberattack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Operations Center:
Red Team Aspects

A

Responsible for performing penetration testing in an organization. Tests try to avoid Security Operations Center detection and perform stealthy maneuvers that simulate how actual cybercriminals launch attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Operations Center:
Purple Team

A

When Red and Blue teams in an organization are integrated, their cybersecurity experts can more efficiently test and improve an organizations defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Viruses?

A

A computer virus is a type of malware designed to perform damaging and illegal operations on a host computer, primarily by deleting critical systems files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do viruses spread?

A

Viruses spread from file to file, it attempts to achieve higher privilege along the way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do viruses impact a computer?

A

Performance issues- OS frequently freezes or crashes, or there is prolonged boot-up, a drop in performance, or an unusual amount of resource usage.
File System Changes- Missing or corrupt computer files.
Abnormal Behavior- Applications and programs are executed without user interaction.
Program Changes- Unusual program activities and changes to the machine, such as the appearance of new files or a changed default homepage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Significance in Cybersecurity:
IT Aspect

A

An important IT team task is the Installation and maintenance of updated protection and identification measures. Usually includes antiviruses on all endpoints and network components of the organization, to detect and prevent the presence of the viruses in organization computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Cybersecurity

A

Cybersecurity refers to any activity that aims to protect devices and systems from both internal and external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Red Team

A

Tests software, system, websites, tools, vulnerabilities, and more from the attacker’s perspective.

17
Q

Blue Team

A

Defends against potential threats by monitoring systems, implementing patches, closing security holes, providing real-time protection against attacks.

18
Q

Purple Team

A

Combines some aspects of Blue Team and Red Team, purple team will test and attack a system, resolve any issues that are discovered on their own.

19
Q

Yellow Team

A

A rarely employed team that consists of the developers who are also knowledgeable in the areas of cybersecurity, and are able to design code that can thwart software related attacks.

20
Q

Anti Virus

A

An endpoint protection application that inspects and detects viruses and malware. If a program is determined to be malicious, the anti-virus will handle the threat by, for example, removing it, deactivating it, or isolating it.

21
Q

Two Elements of antivirus

A

Database are lists of strings and actions that may indicate malware activity,
Rules are sets of definition that together can be used to profile various types of malware.

22
Q

File Signature

A

A type of AV that identifies malware based on raw data, name, size, has, bits, address, author, and magic bytes.

23
Q

Heuristics

A

A type of AV that analyzes malware behavior, including the memory it uses and communication with the kernel, system, and network via DDLs.

24
Q

Penetration Testing

A

An authorized simulated cyberattack on a computer system or network designed to check for exploitable vulnerabilities.

25
Q

Penetration Testing Types

A

Internal- a penetration tester will assume the role of an intruder in an internal network.
External- the pen tester will examine publicly available information about the organization or any publicly facing assets, such as cloud-based application, mails servers, and websites, and attempt to breach them remotely.
Web application- the pentester will gather information about the target web application, find exploits, and exploit them.
Mobile Application- the pen tester will use various techniques to understand the application’s logic and methods of an operation via tools used for static and dynamic analysis.

26
Q

Penetration Testing Types

A

Internal- a penetration tester will assume the role of an intruder in an internal network.
External- the pen tester will examine publicly available information about the organization or any publicly facing assets, such as cloud-based application, mails servers, and websites, and attempt to breach them remotely.
Web application- the pentester will gather information about the target web application, find exploits, and exploit them.
Mobile Application- the pen tester will use various techniques to understand the application’s logic and methods of an operation via tools used for static and dynamic analysis.

27
Q

Significance in Cybersecurity:
Red Team Aspects

A

Red Team Aspects- the cybersecurity firm performs penetration tests. From start to finish, the red team will use a wide array of real-time techniques in response to their findings, including the use of automatic testing tools, to save time often spent on tedious tasks and common vulnerabilities.

28
Q

Significance in Cybersecurity:
Blue Team Aspects

A

Two roles are performed by the blue team during penetration testing. The first role is to act as part of the organization’s defenses and negate any attempt to breach it. The second role is to apply mitigations and recommendations passed on by the red team during their evaluation of the organization’s security level.

29
Q

Red Team

A

The Red Team is a group of security professionals who are hired by an organization to perform Penetration Testing on it’s systems, including software applications, websites, and operating systems.

30
Q

Threats

A

In cybersecurity, threats refer to malicious actions that can damage the cyber systems of individuals or corporations.
Threat assessment and risk analysis are methods used to measure threat levels within an organization.

31
Q

Risk Evaluation Matrix

A

A risk matrix is a table that categorizes threats according to their likelihood and security levels. The table helps organizations formulate risk management plans, policies, rules, services, and lessons.

32
Q

Threats in Cybersecurity

A

Cyberthreats are key elements in most security platforms, including antivirus programs, payment systems, and anti-injection and anti-crack protection software.

33
Q

The following threats are classified as “extreme” risks that frequently impact organizations:

A

Ransomware- Malware designed to capture or encrypt data stored on the victim’s computer. The data can be encrypted only in exchange for a given cryptocurrency payment.
Phishing- Hackers commonly employ various phishing techniques since they are relatively easy to use and simple to perform.
Denial-of-Services- classified as an extreme threat to company operations. It targets corporate servers and prevents legitimate users from accessing critical network resources, information systems, and devices.

34
Q
A