Module 1 Flashcards

The Danger

1
Q

Connecting to a rogue wireless network (hotspot) is also called…

A

Rogue wireless hotspots are also known as “evil twin” hotspots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Ransomware? How does it work and who does it affect?

A

Typically, employees of an organization. Attachments are generally opened, that installs ransomware (company data collected). Goal is financial from the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is malware? How is it different from a worm?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat actor? What are the main groups are threat actors?

A

Malicious actor that is an entity that is partially or fully responsible for security incident that impacts or has the potential to impact an organizations security. Hackers, Hacktivist, state sponsored, or insider threat, terrorist groups, amateurs or organized crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Amateurs - few notes

A

Script kiddies, they often use tools or instructions found on the internet. Use basic skills, sometimes with devastating results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacktivists

A

Think activist - publicly protest against a variety of social and political ideas. They leak sensitive information, and disrupt web services with illegitimate traffic in DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Financial Gain

A

Much of the hacking activity is motivated by financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trade Secrets and Global Politics

A

Nation states hack each other, intellectual property is a significant advantage in the international trade.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IoT - what is it and how is it a problem

A

Many devices are not updated with the latest firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Impact - PII, PHI and PSI

A

Personally Identifiable Information (name, SSN, birthdate, credit care numbers), Personal Health Information and Personal Security Information (usernames, passwords).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly