lecture 3 Flashcards

1
Q

What is a cyber attack?

A

an attempt by cybercriminals, hackers or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying or exposing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the goals of hackers toward businesses or organizations?

A

the hacker’s goal is usually to access sensitive and valuable company resources, such as intellectual property (IP), customer data or payment details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of cyber Attacks

A

Malware
Phishing
Ransomware
Denial of Service
Man in the middle
Cryptojacking
DNS tunneling
zero day exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denial of service

A

A denial-of-service (DoS) attack is designed to prevent online services from working efficiently, also known as abrute-force attack.

It is typically caused by an attacker flooding a website with huge amounts of traffic or requests, in an attempt to overwhelm its systems and take them offline.

A more advanced DoS form is a distributed denial-of-service(DDoS) attack, through which an attacker takes control of several computers to overload its target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Man in the middle attacks

A

MITMattacks enable malicious actors to position themselves between the target victim and an online service the user accesses.
An example of this is an attacker creating a spoofed, free-to-access Wi-Fi network. When the user connects to or signs into the network, the attacker can steal the login credentials and data they use while on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a malware?

A

is malicious software designed to cause damage to computers, networks, and servers.
includes trojans, viruses and worms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Phishing attack?

A

This attack tricks a target into downloading malware or entering sensitive information into spoofed websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are ransomware attacks?

A

Attacks are financially fueled form of malware attack. Attacker demands a ransom fee from the victim and will only restore access upon payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cryptojacking?

A

When a bad actor takes control of a device or server to mine for cryptocurrency.

The only sign of cryptojacking is a loss or reduction in computer performance or overactive cooling fans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are SQL Injections?

A

Attackers use Structured Query Language injection to exploit vulnerabilities and seize control of a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Zero-day attacks?

A

Target vulnerabilities in software code that businesses have not yet discovered, and as a result, have not been able to patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DNS tunneling?

A

This targets the Domain Name System, a protocol that translates web addresses into IP addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Confidentiality?

A

Confidentiality prevents the unauthorized disclosure of data.

The loss of confidentiality is the disclosure of information to unauthorized user.

Confidentiality data can be protected using such technique as access control, encryption, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is integrity?

A

Integrity provides assurances that data has not changed, modified, tampered with, or corrupted by unauthorized user.

Data Integrity can be preserved by Hashing etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is availability?

A

indicates that data and services are available to authorized user where and when needed.

Organizations implement redundancy and fault-tolerant methods to ensure high levels of availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Preventative Controls?

A

to prevent security incidents from occurring.

17
Q

What are deterrent controls ?

A

An attempt to discourage individuals from causing an incident

18
Q

What are detective controls?

A

an attempt to detect incidents after the have occurred.

19
Q

What are Compensating controls?

A

implemented to mitigate risk and make up for deficiencies in other controls

20
Q

What are corrective controls?

A

an attempt to reverse the impact of an incident.

21
Q

What are management Controls?

A

focus on the management of risk and the management of Info system security.

22
Q

What are operational controls ?

A

Primarily implemented and executed by people .

23
Q

What are Information Systems?

A

a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.

24
Q

What are the types of systems?

A

General Support Systems/Enclave

Major Application

Minor Application

Sub-System

National Security