Week 1 - Intro to Security Flashcards

1
Q

What is Cyber Security?

A

security of any device connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information Security?

A

the security of any information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Computer Security?

A

security of any computing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three stages of cyber security process?

A

Prevent, Detect and Respond to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to approach Cyber security?

A

through Risk Management

  1. Identify assets
  2. Determine Potential Risks
  3. Determine mitigation techniques to implement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the CIA triad?

A
  1. Availability - data available to authorised users
  2. Confidentiality - data kept private
  3. Integrity - data kept correct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Bad actor or Threat actor?

A

A user trying to gain unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a malicious and non-malicious actor?

A

Malicious - Somone with intent to cause harm

Non-Malicious - Someone unintentionally compromises the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are vulnerabilities, threats, and attacks?

A

Vulnerability - limitations that compromises a system

Threat - someone/something that poses a threat to data

Attack - an attempt to harm the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an attack surface and attack vector?

A

Attack surface - All points of entry are exploited

Attack Vector - a Specific path is exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

three UK laws related to cybersecurity

A

Computer Misuse Act 1990
Serious Crime Act 2015
Data Protection Act 2018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is security an iterative process?

A

Requires continuous monitoring and updates to adapt to new threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly