quiz1 Flashcards
Security is:
To be free from ____
danger
As security is increased, ____ is often decreased
convenience
There are three types of information protection (often called the CIA Triad)
___
___
___
Confidentiality - only approved individuals may access information
integrity - ensures information is correct and unaltered
Availability - ensures information is accessible to authorized users
A ___ ___ is an individual or entity responsible for cyber incidents against the
technology equipment of enterprises and users
threat actor
or attacker
three types of hackers
black hat hacker
white hat hacker
grey hat hacker
____ ____ are individuals who want to
perform attacks, yet lack technical knowledge
to carry them out
script kiddies
Individuals that are strongly motivated by ideology (for the sake of their principles or beliefs)
are ____
hacktivists
Governments are increasingly employing their own state-sponsored attackers for launching
cyberattacks against their foes
these are __ __
Which type of threat actor is often involved in multiyear intrusion campaigns targeting highly
sensitive economic, proprietary, or national security information?
state actors
The attacks are targeted at foreign governments and state
infrastructures with the goal of gaining a competitive advantage on the world stage or
in an actual warfare situation.
what is apt
advanced persistent threat
Employees, contractors, and business partners can pose an ___ ___ of manipulating
data from the position of a trusted employee
insider threat
One of the most successful types of attack is ___ ___
it does not even exploit ___ ___
social engineering
technological vulnerabilities
Cybersecurity vulnerabilities can be categorized into
__
__
__
__
__
platforms,
configurations,
third parties,
patches,
zero-day vulnerabilities
vulnerabilities - platforms
3 platforms with vulnerabilities
legacy platforms
on-premises platforms
cloud platforms
vulnerabilities - third parties
One of the major risks of third-party system integration involves the principle of the
weakest link
vulnerabilities - patches
firmware, application software, OS
An ___ ___ is a pathway or avenue used by a threat actor to penetrate a system
categories
Attack vector
- Wireless
- Removable media
- Direct access
- Social media
- Supply chain
- Cloud
___ ___is a means of eliciting information (gathering data) by relying on the
weaknesses of individuals
social engineering
social engineering psychological approaches often include:
___ is masquerading as a real or fictitious character and then playing the role
of that person with a victim
___ is sending an email message or displaying a web announcement that falsely
claims to be from a legitimate enterprise in an attempt to trick the user into surrender
private information or taking action
impersonation
Phishing
variations of phishing attacks (4)
spear phishing
whaling
vishing
smishing
social engineering psychological approaches often include:
___ is when an attacker directs a user to a fake lookalike site filled with ads for
which the attacker receives money for traffic generated to the site
__ is unsolicited email that is sent to a large number of recipients
redirection
spam
___ is Attackers purchase fake sites because the domain names of sites are spelled
similarly to actual sites
typo squatting
____ is the attacker attempts to exploit
how a URL is converted into its corresponding IP address
pharming
T/F
image spam cannot be filtered
T
___ is spam delivered through instant messaging (IM) instead of email
spim
___ are false warnings, often contained in an email message claiming to come from
the IT department
Hoaxes
A ___ ___ ___ is directed toward a smaller group of specific individuals
watering hole attack (social engineering)
___ ___ take advantage of user actions that can result in compromised security
physical attacks (is social engineering)
Types of physical attacks
___ ___ involves digging through trash receptacles to find information that can
be useful in an attack
___ occurs when an authorized person opens an entry door, one or more individuals can follow behind and also enter
___ ___ allows an attacker to casually observe someone entering secret
information, such as the security codes on a door keypad
dumpster diving
tailgating
shoulder surfing
these are social engineering
what is google dorking
electronic version of dumpster diving where you search for documents and data online that could be used in an attack