Luck based studying Flashcards

1
Q

HACKTIVIST:

A

Grey hat hackers who rally and protest different political and social ideas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An example of a vulnerability database?

A

The National Common Vulnerabilities and Exposures (EVE) database.
Publicly available database of all known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An example of an early warning system?

A

Honeynet project creates a warning when someone accesses your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An example of a company that shares cyber intelligence?

A

InfraGard, partnership of the FBI and private sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISM Standards?

A

ISO/IEC 27000 standards are an example of Information Security Management standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What group tracks laws enacted to cyber security?

A

ISACA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of an attack that successfully destroyed infrastructure.

A

Stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is scada used for?

A

Supervisory Control and Data Acquisition

used to control and monitor industrial processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BYOD?

A

Bring Your Own Device

Using a mobile device for company purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IoT?

A

Internet of Things

The collection of technologies that enable the connection of various devices to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an APT

A

Advanced Persistent Threat

Continuous computer hack that occurs under the radar against a specific object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Algorithm attacks?

A

Can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Federated identity?

A

A federated identity links a subject’s electronic identity across separate identity management systems. Exe, using google account ot log into Yahoo.

The most common way to protect federated identity is to tie login ability to an authorized
device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TDoS

A

Telephone denial of service attack uses phone calls to tie up a system while not letting any calls get through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

National Institute of Standards and Technologies?

A

NIST

created a framework for companies and organizations in need of cybersecurity professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

National Cybersecurity Workforce Framework

includes providing support, administration, and maintenance

A

Operate and Maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

National Cybersecurity Workforce Framework

includes the identification, analysis, and mitigation of threats.

A

Protect and Defend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

National Cybersecurity Workforce Framework

Examine cyber events and/or crimes of IT systems

A

Investigate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

National Cybersecurity Workforce Framework

includes specialized denial and deception operations.

A

Collect and Operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

National Cybersecurity Workforce Framework

review and evaluation of incoming cybersecurity information.

A

Analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

National Cybersecurity Workforce Framework

provides for leadership, management, and development

A

Oversight and Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

National Cybersecurity Workforce Framework

includes conceptualizing, designing, and building secure IT systems.

A

Securely Provision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DNS, HTTP. and online databases?

A

Prime targets for cybercriminals and packet sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Packet forgery?

A

also called interferes with an established network communication by constructing packets to appear as if they are part of a communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Internal security threats?

A

Improper handling of confidential information, abuse of administrator privileges, knowledge of security countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

External security threats?

A

Amaterur or skilled hackers, cna use vulnerabilities in netowkr devices, social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Impact of Big Data

A

Big data is the result of datasets that are large and complex, making traditional
data processing applications inadequate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

▪ ISACA Certified Information Security Manager (CISM)

A

– Cybersecurity specialists
responsible for managing, developing and overseeing information security systems at the enterprise level or for those developing best security practices can qualify for CISM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The first dimension of the cybersecurity cube?

A

Identifies the goals to
protect the cyber world.

Confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The second dimension of the cybersecurity cube?

A

protecting all of the states of data in the cyber world.

Data at rest or in storage, data in transit, data in process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The third dimension of the cybersecurity cube?

A

defines the types of powers used to protect the cyber world.

Technologies- devices, and products available to protect information systems and fend off cyber criminals.

Policies and Practices -procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices

People - Aware and knowledgeable about their
world and the dangers that threaten their
world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Confidentiality?

A

prevents the disclosure of information to unauthorized people, resources and processes. Another term for confidentiality is privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Integrity?

A

▪ Integrity is the accuracy, consistency, and trustworthiness of data during its entire life
cycle.
Another term for integrity is quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Availability?

A

used to describe the need to maintain availability
of information systems and services at all times.

Methods for ensuring availability include system redundancy, system
backups, increased system resiliency, equipment maintenance, up-to-date
operating systems and software, and plans in place to recover quickly from
unforeseen disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Accounting?

A

keeps track of what users do, including what they access, the amount of time
they access resources, and any changes made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Integrity check?

A

is a way to measure the consistency of a collection of data (a file, a
picture, or a record)

Does a hash function to take a snapshot of data at an instant in time.

37
Q

Data at rest?

A

a type of storage

device retains the data when no user or process is using it.

38
Q

Direct attached storage- DAS

A

Direct-attached storage is connected to a computer.

39
Q

RAID?

A

Redundant array of independent disks

RAID provides improved
performance and fault tolerance.

40
Q

Network attached storage device NAS

A

A network attached storage device is a storage device connected to
a network that allows storage and retrieval of data from a centralized
location by authorized network users

41
Q

Storage area netowrk SAN

A

Storage area network is a network-based storage

system.

42
Q

Data in Transit?

A

involves sending information from one device to another

43
Q

Ways to transmit data

A

Sneaker net (USB), wired network, and wireless networks.

44
Q

Data in process?

A

data during initial input,

modification, computation, or output.

45
Q

The ISO Model?

A

International Organization for Standardization

developed a comprehensive framework to guide information security management.

46
Q

Virus?

A
  • A virus is malicious executable code attached to

another executable file, such as a legitimate program

47
Q

Worms?

A
  • Worms are malicious code that replicates by

independently exploiting vulnerabilities in networks.

48
Q

Trojan horse?

A
  • A Trojan horse is malware that carries out
    malicious operations under the guise of a desired operation such
    as playing an online game.
49
Q

Logic bomb?

A

A logic bomb is a malicious program that

uses a trigger to awaken the malicious code.

50
Q

Ransomware?

A

Ransomware holds a computer system, or
the data it contains, captive until the target makes a
payment.

51
Q

Backdoors and Rootkits?

A
  • A backdoor or rootkit refers to the program or code introduced by a criminal who has compromised a system.
52
Q

Spam?

A

Spam, also known as junk mail, is unsolicited

email.

53
Q

Spyware?

A
  • Spyware is software that enables a criminal to

obtain information about a user’s computer activities.

54
Q

Adware?

A
  • Adware typically displays annoying pop-ups

to generate revenue for its authors.

55
Q

Scareware?

A

Scareware persuades the user to take a

specific action based on fear.

56
Q

Phishing?

A

using email, instant messaging, or other
social media to try to gather information such as
login credentials or account information by
masquerading as a reputable entity or person.

57
Q

Spear phishing?

A

Spear phishing is a highly

targeted phishing attack.

58
Q

Vishing?

A

Vishing is phishing using voice communication technology.

59
Q

Pharming?

A

Pharming is the impersonation of a
legitimate website in an effort to deceive users into
entering their credentials.

60
Q

Whaling?

A

Whaling is a phishing attack that targets
high profile targets within an organization such as
senior executives.

61
Q

SEO Poisoning?

A

SEO poisoning uses SEO to make a malicious website appear higher in search
results

62
Q

Browser hijacker

A

A browser hijacker is malware that alters a computer’s
browser settings to redirect the user to websites paid for by the cyber criminals’
customers.

63
Q

Pretexting?

A
  • This is when an attacker calls an individual and

lies to them in an attempt to gain access to privileged data.

64
Q

Quid pro quo?

A

This is when an
attacker requests personal information from a party in
exchange for something, like a gift.

65
Q

Shoulder Surfing and Dumpster Diving?

A

refers to picking

up PINs, access codes or credit card numbers.

66
Q

Impersonation and Hoaxes?

A

Impersonation is the action

of pretending to be someone else.

67
Q

Piggybacking and Tailgating?

A

Piggybacking occurs when

a criminal tags along with an authorized person to gain entry into a secure location or a restricted area.

68
Q

Symmetric algorithms?

A

These algorithms use the same pre-shared key,
sometimes called a secret key pair, to encrypt and decrypt data. Both the
sender and receiver know the pre-shared key

69
Q

Asymmetric algorithms?

A

Asymmetrical encryption algorithms use one key to

encrypt data and a different key to decrypt data.

70
Q

3DES?

A

Triple Digital Encryption Standard, symmetric block cipher with 64-bit block 56-bit key.

Encrypts data three times and uses a different key for at least one

71
Q

IDEA?

A

International Data Encryption Algorithm
64-bit blocks and 128-bit keys

Performs eight rounds of transformations of each of the 16 blocks

72
Q

AES?

A

Advanced Encryption Standard 128-bit, a key size of 128,192, or 256. U.S government uses this.

73
Q

Physical Access Controls?

A

Barriers to prevent direct contacts with system.

74
Q

Logical Access Controls?

A

hardware and software solutions

75
Q

Administrative Access Controls?

A

Policies and procedures

76
Q

MAC?

A

Mandatory access control - restricts the actions that a subject can
perform on an object. User cannot access _____

77
Q

DAC?

A

Discreitionay access control grants or restricts object access determined by the object’s owner.

Owner of a .doc file chooses who to share it with.

78
Q

RBAC?

A

is based on the role of the subject.

Accountants do not have access to IT files.

79
Q

Rule-based access control?

A

Rules determine access

Staff cannot look at payroll after hours on weekends.

80
Q

What You Know

A

passwords, passphrases, pins

81
Q

What You Have

A

smart cards and security key fobs

82
Q

Who You Are

A

fingerprint, retina

83
Q

Multi-factor authentication

A

Two ways to confirm identity,

password and phone.

84
Q

Data masking?

A

Data masking is a technology that secures data by replacing sensitive information with a non-sensitive version.

85
Q

Substitution?

A

replaces data with authentic looking values to apply

anonymity to the data records.

86
Q

Shuffling?

A

makes up a substitution set from the same column of data that a user wants to mask.

87
Q

Steganography?

A

Conceals data in another file like a graphic, audio, or other text file.

88
Q

Data obfuscation?

A

The use and practice of data masking and steganography in cybersecurity and cyber intelligence.