Security & Risk Management Flashcards

1
Q

focuses on information systems, aiming to
reduce the impact and likelihood of threats such as
cyberattacks, employee mistakes, and natural disasters.

A

cyber risk
management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

involve identifying,
assessing, and controlling risks to an organization’s capital,
earnings, and critical assets

A

Security and risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

These risks can arise from
various sources, including financial uncertainty, legal
liabilities, strategic management errors, accidents, and natural disasters.

A

Security and risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a
guiding model in information
security. A comprehensive
information security strategy
includes policies and security
controls that minimize threats to these three crucial components

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to protecting
information from unauthorized
access.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

means data are
trustworthy, complete, and have
not been accidentally altered or
modified by an unauthorized user.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

means data are
accessible when you need them.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Governance six key principles:

A
  1. Responsibility
  2. Strategy
  3. Acquisition
  4. Performance
  5. Conformance
  6. Human Behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Clearly define roles and responsibilities for security across the
organization.

A

Responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Align security efforts with the overall business strategy

A

Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When acquiring new technologies or services, evaluate their
security implications.

A

Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Continuously monitor and assess security performance.

A

Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ensure compliance with relevant regulations, standards, and
policies.

A

Conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Promote secure behaviors among employees.

A

Human Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Is an attempt by cybercriminals,
    hackers or other digital adversaries to access a
    computer network or system, usually for the
    purpose of altering, stealing, destroying or
    exposing information.
A

CYBERATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

— is any program or code that is created with the intent to do harm to a
computer, network or server.

A

Malware

16
Q

an adversary encrypts a victim’s data and offers to provide a decryption key in exchange
for a payment.

A

Ransomware

17
Q

is a type of malicious activity that uses native, legitimate tools built
into a system to execute a cyber attack.

A

Fileless Malware

18
Q

type of unwanted, malicious software that infects a computer or other device and collects
information about a user’s web activity without their knowledge or consent.

A

Spyware

19
Q

type of spyware that watches a user’s online activity in order to determine which ads to show
them. While adware is not inherently malicious, it has an impact on the performance of a user’s device
and degrades the user experience.

A

Adware

20
Q

malware that appears to be legitimate software disguised as native operating system
programs or harmless files like free downloads. Trojans are installed through social engineering
techniques such as phishing or bait websites

A

Trojan

21
Q

a self-contained program that replicates itself and spreads its copies to other
computers.

A

Worm

22
Q

a collection of software designed to give malicious actors control of a computer
network or application. Once activated, the malicious program sets up a backdoor exploit and
may deliver additional malware.

A

Rootkits

23
Q
  • are tools that record what a person types on a device.
A

Keylogger

24
Q

Common Types of Cyberattacks

A
  1. Malware
  2. Ransomware
  3. Fileless Malware
  4. Spyware
  5. Adware
  6. Trojan
  7. Worm
  8. Rootkits
  9. Keylogger
  10. Denial of Service Attacks
  11. Phishing
  12. Spear Phishing
  13. Whaling
25
Q

is a malicious, targeted attack that floods a network with false
requests in order to disrupt business operations.

A

DoS Attack

26
Q
  • type of cyberattack that uses email, SMS, phone, social media, and social engineering
    techniques to entice a victim to share sensitive information — such as passwords or account
    numbers.
A

Phishing

27
Q

type of phishing attack that targets specific individuals or organizations
typically through malicious emails.

A

Spear Phishing

28
Q
  • is a type of social engineering attack specifically targeting senior or C-level executive
    employees with the purpose of stealing money or information, or gaining access to the person’s
    computer in order to execute further cyberattacks.
A

Whaling

29
Q
  • is the act of sending fraudulent text messages designed to trick individuals into sharing sensitive data such as
    passwords, usernames and credit card numbers.
A

Smishing

30
Q

a voice phishing attack, is the fraudulent use of phone calls and voice messages pretending to be from a
reputable organization to convince individuals to reveal private information such as bank details and passwords.

A

Vishing

31
Q
  • is a technique through which a cybercriminal disguises themselves as a known or trusted source.
A

Spoofing

32
Q

is a type of cyberattack in which an attacker eavesdrops on a conversation between two
targets with the goal of collecting personal data, (passwords or banking details).

A

Man in the middle Attack

33
Q
  • is a technique where attackers use psychological tactics to manipulate people into taking a desired
    action.
A

Social Engineering

34
Q

is a type of physical security breach in which an unauthorized person follows an authorized
individual to enter secured premises

A

Tailgaiting