Untitled Deck Flashcards
What are assets in cybersecurity?
Assets are valuable things in a computer system that need protection, such as data and money.
Example: My data and money with ADCB.
What does vulnerability mean?
A vulnerability means a weakness that could be exploited by an attacker, often due to outdated software or bugs in code.
Example: Wattpad being breached allows access to user data.
Who is a threat actor?
A threat actor refers to anyone who wants to attack a system, such as a cybercriminal.
Example: A cybercriminal attacking a bank.
What is a threat?
A threat is potential harm that an attacker could inflict, such as extortion or data exposure.
Example: ‘I will expose your data if you don’t pay me a ransom.’
Define risk in cybersecurity.
Risk refers to the chance that an attacker will successfully exploit a vulnerability and cause harm.
Example: A threat actor guessing a weak password.
What does it mean to exploit a vulnerability?
To exploit means to take advantage of a vulnerability.
Example: A threat actor exploiting outdated software.
What is a payload in cybersecurity?
A payload refers to the demands made by a hacker after successfully exploiting a vulnerability.
What is a countermeasure?
A countermeasure is a security measure taken to prevent attacks on a computer system.
Examples: Firewalls, antivirus software, Multi-factor authentication, encryption.
What does the CIA triad stand for?
The CIA triad stands for:
* Confidentiality
* Integrity
* Availability
What is non-repudiation?
Non-repudiation ensures that a person cannot deny having sent a message or made a transaction.
Examples: Digital signatures, message authentication.
Define access control.
Access control is a security service that prevents unauthorized access to data, systems, and resources.
What does the AAA model represent?
The AAA model manages user access and tracks their activities, consisting of:
* Authentication
* Authorization
* Accounting
What is the purpose of authentication?
Authentication verifies that a user is who they claim to be.
Example: Logging into an account using a password.
What does authorization determine?
Authorization determines what resources and actions a user is allowed to access after authentication.
What does accounting track?
Accounting tracks and logs a user’s activities, including resources accessed and session duration.
What is cyberspace?
Cyberspace refers to the digital world where computers, networks, and the internet interact.
What is the ‘weakest link’ in cybersecurity?
The weakest link refers to the human factor, as even the best security technologies can be compromised by human error.
What are the four classes of cybersecurity threats?
The four classes are:
* Disclosure
* Deception
* Disruption
* Usurpation
What is threat modeling?
Threat modeling is a process used to identify risks, analyze them, and find ways to reduce or eliminate them.
What is a data breach?
A data breach occurs when sensitive data is accessed, stolen, or exposed without authorization.
Who are hackers?
Hackers are skilled individuals in computer systems who can be ethical or malicious.
Examples include white hat hackers (ethical) and black hat hackers (malicious).
What is defense in depth?
Defense in depth is a security strategy that involves multiple layers of protection.
Examples: Perimeter security, network security, host security, application security, data security.
What is an attack surface?
An attack surface is the total number of vulnerabilities and entry points in a system that an attacker can exploit.
What is an attack tree?
An attack tree is a hierarchical diagram that analyzes different ways an attacker can exploit a system.