Secuirty Flashcards

1
Q

What is phishing?

A

social engineering attack where attacker masquerades as a trusted entity to steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Traditional secuirty procedures

A

Use strong passwords, control access to data and systems, installing reliable antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is asynchronous encryption type

A

RSA. 1024-2048 bits in length. Slower process, incomparable security. Used in email certificates, SSL/TLS certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some common security threats?

A

Phissing
Typo Squatting
DNS typo poisening
SQL Injection
Trojan Hourse
DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing?

A

social engineering attack where attacker masquerades as a trusted entity to steal data. Typically refers to an email that looks like it came from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an SQL Injection?

A

Modify sql requests such as putting an SQL query in a text field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a trojan horse?

A

software pretending to be something else to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a worm?

A

Malware that replicates itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we mitigate or prevent these threats from happening?

A

Network segmentation, intrusion detection systems, intrusion prevention systems, reduce insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DNS cache poisoning?

A

Changing the DNS cache so a user is sent to the wrong website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an example of a cyber attack?

A

Man-in-the-middle - an attacker positions himself in a conversation between a user and an application or user and another user to eavesdrop of impersonating with the goal of stealing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is identity management?

A

a framework of policies and technologies to ensure that the right users have the appropriate access to technology resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly