LO3 Flashcards

1
Q

What does it mean by mitigating a risk?

A

testing systems and networks for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does it mean by monitoring and controlling a system?

A

how assets can be monitored and controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is vulnerability testing?

A

identification of a list of vulnerabilities that can be prioritised in order of severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is penetration testing?

A

where an attack is simulated; it is designed to achieve a specific goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is fuzzing?

A

inputting large amounts of data in an attempt to make the system crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is sandboxing?

A

test environment that isolates untested code changes to ensure that any issues are not transmitted to other areas of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an intrusion detection system (IDS)?

A

device or software used to monitor systems for malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Network intrusion detection system (NIDS)?

A

monitors all inbound and outbound network activity to identify any suspicious patterns that indicate a cyber security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two examples of Host intrusion detection system (HIDS)?

A

firewall or anti virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a distributed intrusion detection system (DIDS)?

A

multiple ID’s over a large network that communicate with each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is anomaly based testing?

A

monitors network and system activity and clarifies whether the activity as expected or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is signature based testing?

A

monitors specific patterns for network traffic or known instruction sequences used by malware. it must be kept up to data to be effective and require regular signature updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a honeypot system

A

a computer system that acts as a decoy to detect, deflect and even counteract any unauthorised use of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is IPS?

A

Intrusion Prevention System
proactive detection and prevention against unwanted intruders, for example a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the physical cyber security controls?

A

biometrics
swipe cards
alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the hardware cyber security controls?

A

safe
cable locks
engraving
Smartwater

17
Q

what are the software cyber security controls?

A

firewall
anti-malware
operating system updates
patch managements

18
Q

what are the two types of encryption?

A

asymmetric
symmetric

19
Q

what is asymmetric encryption?

A

also known as public key cryptography. it uses two keys to encrypt plaintext. anything encrypted using a public key can only be decrypted using a private key. it tends to be used in day to day communication channels, especially over the internet.

20
Q

what is symmetric encryption?

A

only uses one key shared among the people who need access to the data.

21
Q

what is cryptography?

A

cryptography protects information and resources on open and closed networks.

22
Q

what are the procedures?

A

access management
data backup
remote working

23
Q

what is access management?

A

the process of granting authorised users access to a computer system, network and associated data, as well as preventing access by unauthorised users.

24
Q

what is data backup?

A

the process of copying and/or archiving data including files and folders, so that they can be restored should the data be lost from a system.