Module 1 Flashcards

1
Q

CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Availability

A

The quality of being able to be used or obtained.

Availability concerns occur when operating systems, equipment, and data are not functioning correctly, limiting access to those who need it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

The quality of being honest, whole, or undivided.

The integrity of info refers to protecting info from being modified by unauthorized parties.

Hashing is a big word for this, if you see hashing it is almost always due to integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

The state of being kept secret or private. Ensuring that sensitive info does not reach unauthorized people.

“Need to know base”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A hospital only allows authorized healthcare personnel within one department to access patient Personal Identifiable Information. When employees move to another department, they lose access.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A cybercriminal launches a DDoS attack that floods a website with unwanted traffic from multiple computers and takes the site offline.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A cybercriminal cracks a hashed message and changes its contents.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company’s network infrastructure uses load balancers, which distribute the “load” of tasks, such as file requests and data routing, to a variety of servers. This ensures that no single device is overburdened.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Employees need key cards in order to enter their company offices.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brute Force Attack

A

An Attacker can use brute force attack to continuously attempt username and password combos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to mitigate Brute Force

A

Strong Password Policies: Require complex passwords that must be changed regularly.
Failed Login Attempts:
Implement automatic account lockout after a set number of unsuccessful login attempts to deter brute-force attacks.
Time-Based Lockout:
Consider a temporary lockout period after failed logins, allowing users to retry after a short time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

An attacker can attempt a phishing attack, where users are redirected to fake a login pages that capture user credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to mitigate Phishing

A

Phishing Training and Awareness Programs: Educate employees about the dangers of phishing and how to recognize fraudulent emails
Security Training:
Regularly educate users about phishing scams, password hygiene, and the importance of protecting their login credentials.
Phishing Simulation Tests:
Conduct periodic phishing simulation exercises to evaluate user awareness and identify areas for improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Keylogging

A

An Attacker can deploy malware such as keyloggers to capture daily user activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to mitigate Keylogging

A

Use of Anti-Keylogging Software: Install security software that detects and prevents keyloggers.
Log Analysis:
Regularly review system logs for anomalies that could indicate unauthorized access or malicious activity.
Intrusion Detection/Prevention Systems (IDS/IPS):
Monitor network traffic for suspicious activity and actively block potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stolen Hardware/ Session Hijacking

A

An Attacker can simply exploit a valid computer session to gain unauthorized access to info or services.

17
Q

How to mitigate Stolen Hardware/ Session Hijacking

A

Session Management Security: Implement secure session management practices like HTTPS and secure cookies.

18
Q

Person-in-the-middle Attack

A

An Attacker can create a person in the middle attack by providing a free WiFi hotspot to capture credentials.

19
Q

How to mitigate Person-in-the Middle

A

Encryption: Use end-to-end encryption for data in transit to prevent MITM attacks.

20
Q

Credential Stuffing

A

An Attacker can find and steal users’ login and password info from other websites to gain unauthorized access to a system.

21
Q

How to mitigate Credential Stuffing

A

Multi-Factor Authentication (MFA): Require additional verification methods beyond just passwords to access accounts.

22
Q

SQL Injection

A

An attacker can use a code-injection attack to inject malicious code directly into username or password fields.

23
Q

How to mitigate SQL Injection

A

Regular Security Audits and Code Reviews: Conduct periodic audits and reviews to identify and mitigate SQL injection and XSS vulnerabilities.
A big one for this one is INPUT VALIDATION.

24
Q

Cross-site scripting (XXS)

A

An Attacker can inject malicious scripts into webpages viewed by other users and use these as a backdoor into their system.

25
Q

How to mitigate Cross-site Scripting (XXS)

A

Regular Security Audits and Code Reviews: Conduct periodic audits and reviews to identify and mitigate SQL injection and XSS vulnerabilities.
A big one for this one is INPUT VALIDATION.

26
Q

Exploiting outdated software

A

Attackers can use known vulnerabilities in outdated software to breach security.

27
Q

How to mitigate Outdated Software

A

Software and Patch Management: Regularly update all software to the latest versions to fix known vulnerabilities.

28
Q

Social Engineering

A

An Attacker can ask users for their credentials by pretending to be an administrator.

29
Q

How to mitigate Social Engineering

A

Employee Security Training: Conduct regular training sessions to improve security awareness and reduce the risk of social engineering.
Advanced Intrusion Detection Systems (IDS): Deploy IDS to monitor network and system activities for malicious activities and policy violations.