Security Concepts 2 Flashcards

1
Q

What is (PII)?

A

Personally Identifiable Information (PII), it is stored on computer systems by all of the services and institutions you interact with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the GDPR?

A

General Data Protection Regulation, a well-known legal framework around Information and Data Privacy which is the law of the land in terms of data privacy in the EU (European Union).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Honeypots?

A

Decoy systems or resources designed to attract and detect attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of Honeypots?

A

They serve as a trap, diverting and engaging malicious actors, allowing security professionals to study their methods and tactics. Honeypots can be categorized as low-interaction (emulating services to deceive attackers) or high-interaction (fully functional systems that provide a more realistic target).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Honeynets?

A

Networks of honeypots designed to lure and analyze sophisticated attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of Honeynets?

A

Provide a more comprehensive view of an attacker’s behavior across multiple systems. Mimic a real network environment, aiding in the detection and understanding of coordinated attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Honeyfiles?

A

Fake or decoy files that are strategically placed to attract attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of Honeyfiles?

A

They serve as breadcrumbs, leading attackers away from valuable data and towards false information. By interacting with these files, security teams can gather insights into an attacker’s motives and techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Honeytokens?

A

Pieces of fake data or credentials intentionally placed within a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a security breach?

A

A broader term that considers any incident where the system of a system, network, or organization is compromised. This includes unauthorized access, data breaches, malware infections, physical security breaches, and many more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a data breach?

A

A data breach is any security incident in which unauthorized parties gain access to sensitive data or confidential information, including personal data (Social Security numbers, bank account numbers, healthcare data) or corporate data (customer data records, intellectual property, financial information).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly