Basics and Fundamentals Flashcards

1
Q

What is the act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction?

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the act of protecting the systems that hold and process our critical data?

A

Information Systems Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 parts of the CIA triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is it to have information that has not been disclosed to unauthorized people?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is it to have information that has not been modified or altered without proper authorization?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is it to have information that is able to be stored, accessed, or protected at all times?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the AAA’s of security?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a person’s identity is established with proof and confirmed by a system.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Occurs when a user is given access to a certain piece of data or certain areas of a building.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tracking of data, computer usage, and network resources.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the ways a person’s identity is established?

A
Something you know.
Something you are.
Something you have.
Something you do.
Somewhere you are.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the major security threat types?

A

Malware
Unauthorized Access
System Failure
Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Short for malicious software.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occurs when access to computer resources and data occurs without the consent of the owner.

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Occurs when a computer crashes or an individual application fails.

A

System Failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The act of manipulating a user into revealing confidential information or performing other detrimental actions.

A

Social Engineering

17
Q

What are 3 ways to mitigate threats?

A

Physical, technical and administrative controls

18
Q

Alarm systems, locks, surveillance cameras, identification cards, and security guards.

A

Physical Controls

19
Q

Smart cards, encryption, access control lists (ACLs), intrusion detection systems, and network authentication.

A

Technical Controls

20
Q

Policies, procedure, security awareness training, contingency planning, and disaster recovery plans.

A

Administrative Controls

21
Q

What is the most cost-effective administrative security control to use?

A

User training

22
Q

What are the 5 types of hackers?

A

White, Black, Gray, and Blue Hats, Script Kiddies

23
Q

A non-malicious hacker who attempts to break into a company’s systems at their request.

A

White Hat

24
Q

A malicious hacker who breaks into a company’s computer systems and network without authorization or permission.

A

Black Hat

25
Q

A hacker without any affiliation to a company who attempts to break into a company’s network, but risk the law by doing so

A

Gray Hat

26
Q

A hacker who attempts to hack into a network with permission of the company but are not employed by the company.

A

Blue Hat

27
Q

Hackers who find and exploit vulnerabilities before anyone else does.

A

Elite Hacker

28
Q

Hackers with limited skills who only use other people’s exploits and tools.

A

Script Kiddies

29
Q

What are 4 types of threat actors in order of lowest to highest skill level?

A

Script Kiddies
Hacktivists
Organized Crime
Advanced Persistent Threats

30
Q

Hackers who are driven by a cause like social change, political agendas, or terrorism.

A

Hacktivists

31
Q

Hackers who are part of a crime group that is well-funded and highly sophisticated.

A

Organized Crime

32
Q

Highly trained and funded groups of hackers, often employed by nation states, with covert and open-source intelligence at their disposal.

A

Advanced Persistent Threats