Midterms: Cybersecurity Flashcards

1
Q
  • encompasses the strategic implementation of technologies, processes, and best practices designed to protect digital systems, networks, and data from unauthorized access, cyberattacks, and data breaches.
A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • ensures the confidentiality, integrity, and availability of information while mitigating security risks across various domains
A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 Core Principles of Cybersecurity

A
  • Confidentiality
  • Integrity
  • Authentication
  • Availability
  • Incident Response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Core Principle of Cybersecurity:
- Restricting data access to authorized entities to prevent breaches

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Core Principle of Cybersecurity:
- Ensuring data remains accurate and unaltered during transmission and storage.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Core Principle of Cybersecurity:
- Verifying user, system, and device identities via methods such as Multi-Factor Authentication (MFA).

A

Authentification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Core Principle of Cybersecurity:
- Guaranteeing uninterrupted access to digital resources, even during cyber incidents.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Core Principle of Cybersecurity:
- Detecting, analyzing, and mitigating threats to maintain system resilience.

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5 Advanced Security Mechanisms

A
  • Firewalls
  • Encryption Protocols
  • Security Analytics
  • Artificial Intelligence
  • Real-time Threat Detection Systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5 Emerging Threats and Key Challenges

A
  • Phishing Attacks
  • Ransomware
  • Data Breaches
  • DDoS ( Distributed Denial-of-Service) Attacks
  • SQL Injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Emerging Threats and Key Challenges:
- Social engineering tactics that manipulate users into divulging confidential information.

A

Phishing Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Emerging Threats and Key Challenges:
- Malicious software that encrypts files and demands payment for decryption.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Emerging Threats and Key Challenges:
- Unauthorized access to sensitive data, leading to financial and reputational damage.

A

Data Breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Emerging Threats and Key Challenges:
- Overloading systems with excessive traffic to cause downtime.

A

DDoS (Distributed Denial-of-Service) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Emerging Threats and Key Challenges:
- Exploiting database vulnerabilities to extract or manipulate stored information.

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly