Lecture 13 Flashcards

1
Q

What is a risk in cybersecurity?

A

Risk is the probability of something bad happening, calculated as Risk = Likelihood × Impact.

Understanding risk is essential for effective cybersecurity management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four steps of risk management?

A

Identification, Assessment, Prioritization, and Mitigation/Monitoring.

These steps help organizations systematically manage risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four risk handling strategies?

A

Avoidance, Mitigation, Transference, and Acceptance.

Each strategy addresses risk in different ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between pentesting and vulnerability management (VM)?

A

Pentesting simulates an attack from the outside, while VM assesses vulnerabilities from within the system.

Both are essential for a comprehensive security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does SOC stand for, and what are its functions?

A

Security Operations Center (SOC) is responsible for detection, incident response, threat intelligence, and vulnerability management.

SOCs play a crucial role in maintaining organizational security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four phases of incident management?

A

Preparation, Detection & Analysis, Containment & Recovery, and Post-Incident Activity.

These phases ensure effective response to security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Threat Intelligence in cybersecurity.

A

The collection, analysis, and dissemination of information about potential or ongoing cyber threats.

Threat intelligence is vital for proactive security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the intelligence cycle in cybersecurity?

A

Direction → Collection → Analysis → Production → Dissemination & Feedback.

This cycle helps in systematic threat intelligence operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are common security tools used in cybersecurity operations?

A

SIEM (Security Information and Event Management) and EDR (Endpoint Detection and Response).

These tools help in monitoring and responding to security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of AI in cybersecurity?

A

AI is used for anomaly detection, social engineering attacks, vulnerability identification, and threat automation.

AI enhances the efficiency and effectiveness of cybersecurity measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly