Unit 9 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

This is the protection of computer systems and information from harm, theft, and unauthorized use.

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is the act of protecting yourself and others from attacks that are carried out primarily with computers.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This focuses on keeping software and devices free of threats.

A

Application security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This protects the integrity and privacy of data, both in storage and in transit.

A

Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This includes the processes and decisions for handling and protecting data assets.

A

Operational Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This define how an organization responds to a cybersecurity incident.

A

Disaster recovery and business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event.

A

Disaster recovery policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the plan for when the organization falls back on while trying to operate without certain resources.

A

Business continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This addresses the most unpredictable cyber-security factor: people.

A

End-user education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the main principles of information security?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This means that data should only be able to be seen by the people in the organization that need to see it in order to do their jobs.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is protecting information from being modified by unauthorized parties. It involves maintaining the accuracy, consistency and trustworthiness of data by implementing security measures.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is protecting information from being modified by unauthorized parties.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a person who breaks into a computer system.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is anything that can compromise the confidentiality, integrity, or availability of an information system.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This is any weakness in the information technology (IT) infrastructure that hackers can exploit to gain unauthorized access to data.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This refers to malicious software

A

Malware

20
Q

This is the practice of sending fake emails or messages that appear to come from a trustworthy source

A

Phishing

21
Q

This is a type of malware that encrypts a victim’s files and demands a ransom payment in exchange for the decryption key.

A

Ransomware

22
Q

These are attacks that overload a website or online service with traffic, making it inaccessible to users.

A

Distributed Denial of Service (DDoS) attacks

23
Q

These are threats by current or former employees, business partners, contractors, or anyone who has had access to any systems or networks in the past can be considered an insider threat if they abuse their access permissions.

A

Insider threats

24
Q

This is an eavesdropping attack, where a hacker/intruder intercepts and relays messages between two parties in order to steal data.

A

Man-in-the-middle attack

24
Q

Here, an intruder or group of intruders sneak into a system and remain undetected for an extended period.

A

Advanced persistent threats (APTs)

25
Q

This involves manipulating people into divulging confidential information that compromise security.

A

Social Engineering

26
Q

This is designed to trick users into revealing sensitive information as they appear to be legitimate sources

A

Phishing

26
Q

This is a method used to record the keystrokes made by a user on a computer or mobile device.

A

Key Logging

27
Q

This is also known as packet sniffing or network sniffing. This is the practice of intercepting and analyzing data packets transmitted over a wireless network.

A

Wireless Sniffing

28
Q
A
29
Q
A
30
Q

This is a straightforward method to crack passwords by trying every possible combination until the correct one is found.

A

Brute Force Guessing

30
Q

This is a a type of password cracking by trying all the words in a predefined list known as a “dictionary”

A

Dictionary Attacks

31
Q

This is also known as challenge questions or Knowledge-based authentication that verifies a user’s identity by asking questions to recover the user’s password.

A

Security questions

32
Q

This is the act of secretly listening to private conversations.

A

Eavesdropping

33
Q

This is a deceptive practice where which an attacker falsifies information or identity to impersonate someone or something else.

A

Spoofing

34
Q

These are files or documents sent with the intent to compromise the security of the recipient’s computer, steal information, or deliver malware.

A

malicious Email Attachments

35
Q

This is designed to replicate itself and infect other computer programs, files, or systems.

A

Virus

36
Q

This can self-replicate and spread independently, typically without user interaction.

A

Worms

37
Q

This disguises itself as a legitimate or benign program to deceive users into executing it. These rely on social engineering and user interaction to spread.

A

Trojan Horses

38
Q

These are software applications or scripts designed to perform automated tasks. Used for both legitimate and malicious activities.

A

Bots

39
Q

This is short for advertising-supported software

A

Adware

40
Q

This is a type of malware that collects information about the user’s activities without their consent.

A

Spyware

41
Q

This is a type of malware that encrypts a victim’s files or entire system, rendering them inaccessible.

A

Ransomware

42
Q

This is a type of malware that provides unauthorized access and control over a computer system or network.

A

Backdoor

43
Q

This is short for robot network, is a collection of internet-connected devices or computers that are compromised by malicious software enrolled by a single entity.

A

Botnet

44
Q

This is a subset of cybersecurity that specifically focuses on protecting the confidentiality, integrity, and availability of sensitive information and data. It involves the application of policies and procedures to ensure that data remains secure.

A

Information Security

45
Q
A