PRELIM Flashcards
___ is the most concerned matter as cyber threats and attacks are overgrowing.
Cyber security
Measures taken to protect a computer or computer system (on the internet) against unauthorized access or attack?
Cyber security
Sending emails that appear to be from legitimate companies requesting personal information.
Phishing
An interruption in an authorized user’s access to a computer network, typically one caused with MALICIOUS INTENT.
DoS or Denial-of-Service
Any type of malicious software is designed to harm or exploit any programmable device, service or network.
Malware
_____ is a method of gaining unauthorized access to a network or computer system.
Hacking
An individual who intends to gain unauthorized access to a network or computer system.
Hacker
The entirety of potential and identified cyberthreats affecting a particular sector, group of users, time period, and so forth.
Threat landscape
Give two examples of Treat landscape
- ENISA (European Union Agency for Network and Information Security)
- NIST (National Institute of Standards and Technology)
____ defined as the collection of threats that are observed, information about threat agents, and the current trends of threats
Threat landscape
___ are security incidents or circumstances with the potential to have a negative outcome for your network or other data management systems.
Cyber threats
The three categories under cyber threats
- Intentional threats
- Unintentional threats
- Natural threats
___ are the gaps or WEAKNESSES in a SYSTEM that MAKE threats possible and tempt threat actors to EXPLOIT them.
Vulnerabilities
___ is the POTENTIAL for LOSS, damage or destruction of assets or data caused by a cyber threat.
Risk
___ is a process that magnifies the likelihood of a negative event, such as the exploit of a vulnerability.
Threat
____ is a weakness in your infrastructure, networks or applications that potentially exposes you to threats
Vulnerability
____ makes sure that only authorized personnel are given access or permission to modify data
Confidentiality
___ helps maintain the trustworthiness of data by having it in the correct state and immune to any improper modifications
Integrity
____ means that the authorized users should be able to access data whenever required
Availability
Pros of the CIA triad
- Simplicity
- Balanced
- Open-ended
Cons of the CIA triad
- Limited
- Lack of specificity
- Not holistic
Threat probability is multiplied by the POTENSIAL LOSS that may result, cyber security experts, refer to this as a ___
Risk
Five common types of cyber attacks
- DoS and DDoS
- Malware
- Man-in-the-middle (MITM)
- Phishing
- SQL Injection
OTHER type of cyber attacks
- DNS Spoofing
- Session Hijacking
- Brute force
- Dictionary attacks
- URL Interpretation
- File Inclusion attacks
____ stands for “Malicious Software”
Malware
___ it is designed to gain access or be installed into the computer without the consent of the user
Malware
Types of Malware
- Adware
- Spyware
- Browser hijacking software
- Virus
- Worms
- Trojan Horse
- Scareware