Week 1 Flashcards

1
Q

This acronym refers to Confidentiality, Integrity, and Availability

A

CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This refers to the information only being accessed by the right people

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This refers to the information not being changed or the information being correct

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This refers to the information being accessed whenever needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The term ______ is used to refer to the valuable information online

A

Information Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example: A banking application has to know that the person who recieves the money is really the person they say they are

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example: A person cannot deny that they did an online transaction at a later point

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

An umbrella term for the collection of malicious software that attempts to harm a software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomware

A

A type of malware that demands you to pay money in order to not do a harmful action to your software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

A type of malware that ‘‘spies’’ on people, recording information assets such as their online activity and passwords then transmitting these datas to the person who made the malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Botnets

A

It is created by a malware that can control different computer. It can be used for gathering personal information or attacking others, such as spam emails, these attacks are called ‘‘denial-of -service’’ attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is a form of social engeeneering attact where a person pretends to be a legitimate business or person to trick people into giving personal informations such as passwords or bank accounts

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ refers to attacks that decieves people into giving information assets by manipulating them

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of phishing attack that targets specific individuals or organizations

A

Spear-Pishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A point where there is a possible security breach

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A danger that exploits vulnerability

A

Threat

17
Q

An action that you take to protect yourself from vulnerability and threats

A

Countermeasures

18
Q

A display of text containing information about a device (cookies, software)

A

Banner