Unit 3 Flashcards

1
Q

What are the 3 pillars of cyber security

A

1.Integrity
2.Cyber security
3.Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does integrity mean in the context of cyber security

A

-The level of assurance that can be given as the accuracy and trustworthiness of the data
-The completeness of data is maintained
-Making sure that data is not modified in an unauthorised manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does cyber security mean in the context of cyber security

A

Cyber security means the protection of computer systems and networks from being attacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does confidentiality mean in the context of cyber security

A

Confidentiality means making sure that data is not accessed by unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the types of cyber-security incidents?

A

-Unauthorized access
-Information disclosure
-Inaccessible data
-Modification of data
-Theft of data
-Destruction of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is unauthorized access?

A

Unauthorized access is where someone gains access to a service, server or other system using someone else’s account or other methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is covered in unauthorized access?

A

-Hacking
-Escalation of privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is hacking in terms of unauthorized access?

A

-Hacking is where unauthorized access is gained over computer network security systems for illicit purposes.

-Its an attempt to exploit a private network in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Privilege escalation in terms of unauthorized access?

A

Privilege escalation is where a bug or design flaw is exploited in an operating system or software application to gain access to resources that users arent supposed to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is unauthorized access?

A

Unauthorized access is where someone gains access to a website, program, server,service or other system using someone else’s account or other methods for illicit purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is included in unauthorized access?

A

-Hacking
-Escalation of privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is hacking in terms of Unauthorized access?

A

Hacking in terms of unauthorized access is where unauthorized access is gained to a computer network security system for illicit purposes. It is an attempt to exploit a private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is modification of data?

A

Modification of data is a cyber security incident where attacks capture, modify steal, delete or intercept data for illicit purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is information disclosure

A

Information disclosure is where an application fails to properly protect data from being accessed by unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What information can be disclosed?

A

-Government information
-Sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is inaccessible data?

A

Inaccessible data is where authorized users are unable to access information systems, devices or other network resources

17
Q

What are the incidents involved in inaccessible data?

A

-Denial of service
-Account lockout

18
Q

What is Denial of service?

A

Denial of service is where the functionality of a device is interrupted, rendering it useless.

19
Q

What is account lockout

A

Account lockout is where a malicious user carries out password attacks on user accounts and if the number of attempts exceeds the account lock of threshold, then it can result in users being unable to log into their accounts.

20
Q

What is destruction of data?

A

Destruction of data is where data stored on all electronic forms of memory is destroyed so that it cannot be accessed or read.

21
Q
A