Module ! Flashcards

1
Q

Cybersecurity

A

“The art of protecting networks, devices, and data from unauthorized access
or criminal use and the practice of ensuring confidentiality, integrity, and availability of
information” —Cybersecurity and Infrastructure Security Agency (2019)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA

A

stands for Confidentiality, Integrity, and Availability, representing the fundamental
principles to ensure data and systems are protected from unauthorized access, tampering,
and downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is cyber security important?

A

Global need, firewalls and antivirus software are no longer sufficient, tech development, users and system access are the biggest threat, businesses cannot properly protect themselves, compliance laws and regulations require more specific procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a problem solver?

A

Problem Solver: A problem solver is someone who identifies and resolves challenges or
obstacles effectively and efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does upskill mean?

A

Upskill: refers to the process of acquiring new knowledge, abilities, or certifications to
enhance one’s expertise and stay current with the evolving cybersecurity landscape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Regulations and compliance laws refer to?

A

Regulations and compliance laws: refer to the legal and industry-specific rules and
standards that organizations must follow to protect sensitive information, maintain data
privacy, and mitigate cyber risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Blue Team do?

A

Blue team: A security team responsible for maintaining overall system security, preventing
security breaches, monitoring potential threats, and researching security technology; typically
responsible for finding and implementing security controls to strengthen the CIA triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Red team do?

A

Red team: An organizational security team responsible for providing security assessments
outlining an organization’s system defense efficacy and resilience; uses penetration testing
tools to search for weaknesses and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Cybersecurity Engineer?

A

Cybersecurity engineer: Keeps computer information systems secure and controls access
to systems based on user classifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Cyberseek?

A

Cyberseek: Website that provides details on cybersecurity-related positions in the US job
market.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Defensive cybersecurity analyst?

A

Defensive cybersecurity analyst: Researches and evaluates security threats and
products; recommends improvements to organizational cyber defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Digital forensic investigator?

A

Digital forensic investigator: Gathers digital information evidence and trails in the systems
to determine how cybercrimes were committed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Ethical Hacker?

A

Ethical hacker: Hired by organizations to legally hack into their networks and identify weak
entry points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Incident detection engineer?

A

Incident detection engineer: Replicates real threats to understand how they operate and how to neutralize them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an IT auditor?

A

IT auditor: Assesses technology for potential security, efficiency, and compliance issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Network Security Administrator?

A

Network security administrator: Responsible for the management and monitoring of organizational network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Security Operations (SOC) analyst?

A

Security operations center (SOC) analyst: Monitors and manages networks; work with
intrusion detection/prevention systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Vulnerability assessment analyst?

A

Vulnerability assessment analyst: Hunts for critical flaws and vulnerabilities in networks,
often as a third-party consultant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Chief Information Security Officer (CISO)?

A

Chief Information Security Officer (CISO): a senior executive responsible for overseeing
and implementing an organization’s information security strategy to protect against cyber threats and ensure data confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is NIST?

A

the National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the benefits of cybersecurity?

A

Business protection against cyberattacks and data breaches.

Protection for data and networks.

Prevention of unauthorized user access.
Improved recovery time after a breach.

Protection for end users and endpoint devices.

Regulatory compliance.

Business continuity.

Improved confidence in the company’s reputation and trust for developers, partners, customers, stakeholders and employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the different types of cybersecurity threats?

A

Malware, Ransomware, Phishing, Social Engineering, Spear Phishing, Distributed denial of service (DDos), Advanced persistent threats (APTs), Man-in-the-middle (MitM) botnets, drive-by-download attacks, exploit kits, malvertising, vishing, credential stuffing attacks, cross-site scripting (XSS), SQL injections attacks, business email compromise (BEC), and zero day exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Malware?

A

Malware is a form of malicious software in which any file or program can be used to harm a computer user. Different types of malware include worms, viruses, Trojans and spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Ransomeware?

A

Ransomware is another type of malware that involves an attacker locking the victim’s computer system files – typically through encryption – and demanding a payment to decrypt and unlock them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Social Engineering?

A

Social engineering is an attack that relies on human interaction. It tricks users into breaking security procedures to gain sensitive information that is typically protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is phishing?

A

Phishing is a form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent. Often random attacks, the intent of these messages is to steal sensitive data, such as credit card or login information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Spear phishing?

A

Spear phishing is a type of phishing that has an intended target user, organization or business.

28
Q

What is Insider threats?

A

Insider threats are security breaches or losses caused by humans – for example, employees, contractors or customers. Insider threats can be malicious or negligent in nature.

29
Q

What is Distributed denial-of-service?

A

Distributed denial-of-service (DDoS) attacks are those in which multiple systems disrupt the traffic of a targeted system, such as a server, website or other network resource. By flooding the target with messages, connection requests or packets, the attackers can slow the system or crash it, preventing legitimate traffic from using it.

30
Q

What are Advanced persistent threats? (APTs)

A

Advanced persistent threats (APTs) are prolonged targeted attacks in which an attacker infiltrates a network and remains undetected for long periods of time with the aim to steal data.

31
Q

What is Man-in-the-middle attacks?

A

Man-in-the-middle (MitM) attacks are eavesdropping attacks that involve an attacker intercepting and relaying messages between two parties who believe they are communicating with each other.

32
Q

What are types of Malware?

A

Spyware, Ransomware, Trojan horse, Remote access, worm, keylogger, virus, adware, rootkit, spyware

33
Q

What are the top cybersecurity challenges?

A

Evolving threats- as new tech emerges new attack avenues are developed.

Data Deluge-as businesses collect more and more data the cyber criminals want to steal PII (personally identifiable information)

Cybersecurity awareness training- regular employee training will help employees do their part to keep the company safe

Workforce shortage and skills gap. As data grows the need for cyber professionals does. They need to analyze, manage, and respond.

Supply chain attacks- Companies have to make sure that their partners also have good security or criminals can get to you through them.

34
Q

How is automation used in cybersecurity?

A

Automation has become an integral component to keep companies protected from the growing number and sophistication of cyberthreats. Using artificial intelligence (AI) and machine learning in areas with high-volume data streams can help improve cybersecurity in three main categories:

Threat detection. AI platforms can analyze data and recognize known threats, as well as predict novel threats.

Threat response. AI platforms also create and automatically enact security protections.

Human augmentation. Security pros are often overloaded with alerts and repetitive tasks. AI can help eliminate alert fatigue by automatically triaging low-risk alarms and automating big data analysis and other repetitive tasks, freeing humans for more sophisticated tasks.

35
Q

What are some Cybersecurity vendors and tools?

A

Identity and access management (IAM)
Firewalls
Endpoint protection
Antimalware/antivirus
Intrusion prevention/detection systems (IPS/IDS)
Data loss prevention (DLP)
Endpoint detection and response
Security information and event management (SIEM)
Encryption tools
Vulnerability scanners
Virtual private networks (VPNs)
Cloud workload protection platform (CWPP)
Cloud access security broker (CASB)

36
Q

Who are well-known cybersecurity vendors?

A

Check Point, Cisco, Code42, CrowdStrike, FireEye, Fortinet, IBM, Imperva, KnowBe4, McAfee, Microsoft, Palo Alto Networks, Rapid7, Splunk, Symantec by Broadcom, Trend Micro and Trustwave.

37
Q

What does a Chief information security officer (CISO) do?

A

Chief information security officer (CISO) is the individual who implements the security program across the organization and oversees the IT security department’s operations.

38
Q

What does the Chief security office (CSO) do?

A

Chief security office (CSO) is the executive responsible for the physical and/or cybersecurity of a company.

39
Q

What do Security engineers do?

A

Security engineers protect company assets from threats with a focus on quality control within the IT infrastructure.

40
Q

What does a Security architect do?

A

Security architects are responsible for planning, analyzing, designing, testing, maintaining and supporting an enterprise’s critical infrastructure.

41
Q

What does a Security analyst do?

A

Security analysts have several responsibilities that include planning security measures and controls, protecting digital files, and conducting both internal and external security audits.

42
Q

What does a Penetration tester do?

A

Penetration testers are ethical hackers who test the security of systems, networks and applications, seeking vulnerabilities that could be exploited by malicious actors.

43
Q

What does a Threat hunter do?

A

Threat hunters are threat analysts who aim to uncover vulnerabilities and attacks and mitigate them before they compromise a business.

44
Q

What is Interview coaching?

A

Interview coaching: Working with an instructor or a professional trainer to develop various
interview strategies and garner constructive feedback to improve overall interview skills.

45
Q

What is professional networking?

A

Professional networking: Building and maintaining relationships with other professionals that work directly within one’s field or in other related areas

46
Q

What is LinkedIn?

A

LinkedIn: professional networking platform that allows individuals in the industry to
connect, share expertise, and seek job opportunities related to Cybersecurity and other fields.

47
Q

What are certifications in Cybersecurity?

A

Certifications: Industry-recognized credentials earned by professionals to validate their
expertise and knowledge in specific areas of Cybersecurity, enhancing their credibility and
marketability to potential employers.

48
Q

What are Vendor-based Certifications?

A

Vendor-based Certifications: industry-recognized credentials offered by specific
technology or cybersecurity solution providers, validating a professional’s proficiency in using and implementing their products or services.

49
Q

What are Non-vendor Certifications?

A

Non-vendor Certifications: industry-recognized credentials that assess a professional’s knowledge, skills, and expertise in cybersecurity principles and best practices without being
tied to any specific technology or solution provider.

50
Q

What is CompTIA?

A

CompTIA: non-profit trade association that offers vendor-neutral certifications to validate and enhance the skills of IT professionals, including those focused on Cybersecurity.

51
Q

What is Security+?

A

Security+: CompTIA certification that validates the foundational knowledge and skills required for entry-level cybersecurity roles, demonstrating proficiency in essential security principles and practices.

52
Q

What is ISC2?

A

ISC2: International Information System Security Certification Consortium, a globally
recognized organization that offers industry-leading certifications such as CISSP (Certified Information Systems Security Professional) to validate professionals’ advanced knowledge
and skills in the field.

53
Q

What is SSCP?

A

SSCP: Systems Security Certified Practitioner certification, provided by ISC2, which validates professionals’ technical knowledge and expertise in implementing and managing
cybersecurity practices and controls.

54
Q

What is Entry-level certification?

A

Entry-level certification: A certification that has no prerequisite certificates, education, or experience.

55
Q

What are Next Level Certifications?

A

Next Level Certifications: advanced credentials beyond foundational certifications, showcasing specialized expertise in specific areas of Cybersecurity and enabling professionals to pursue more challenging and specialized roles in the industry.

56
Q

What is Ec-Council?

A

Ec-Council: International Council of E-Commerce Consultants, an organization that offers industry-recognized certifications like CEH (Certified Ethical Hacker) to validate professionals’ skills in ethical hacking and penetration testing.

57
Q

What is Business Continuity?

A

Business continuity: An organizational plan to deal with disasters and other difficult
situations such as cyberattacks, outages, or supply chain failures.

58
Q

What is Data recovery?

A

Data recovery: A process of retrieving and restoring lost, corrupted, or deleted data from storage devices, ensuring the availability and integrity of critical information.

59
Q

What does financial impact mean?

A

Financial impact: The overall fiduciary cost of an attack or breach to an organization.

60
Q

What is legal liability for a business?

A

Legal liability: Once a business becomes responsible for any individual’s data, it becomes subject to privacy laws. The business could face fines or additional legal penalties if it breaches those laws.

61
Q

What is loss of productivity?

A

Loss of productivity: When employees cannot perform their jobs because of a breach or attack (ransomware being an excellent example).

62
Q

What is Organizational Impact?

A

Organizational Impact: A cybersecurity attack or breach’s impact on an organization’s profits, productivity, image, etc.

63
Q

What is PII?

A

Personally identifiable information (PII): Any information that could identify an
individual, including address, date of birth, social security number, etc.

64
Q

What is Reputational loss?

A

Reputational loss: Losing the trust of business relationships, customers, and partners after a breach or attack.

65
Q

What is a Cyber Weapon?

A

Cyber Weapon: sophisticated malicious software or code specifically designed to infiltrate and manipulate computer systems, like the Stuxnet worm, which was developed as a targeted attack on industrial control systems to disrupt Iran’s nuclear program.

66
Q

What is Critical Infrastructure?

A

Critical Infrastructure: essential physical and virtual assets, systems, and networks that are vital for the functioning of a society, economy, and national security, making them prime targets for cyberattacks.

67
Q
A