buga Flashcards

(83 cards)

1
Q

refers to the measures taken by any enterprise or organization to secure its computer network and data using both hardware and software systems. This aims at securing the confidentiality and accessibility of the data and network.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The network security solutions protect various vulnerabilities of the computer systems such as:

A

Users
Locations
Data
Devices
Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the most basic level that includes protecting the data and network through unauthorized personnel from acquiring control over the confidentiality of the network.

A

Physical Network Security:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It primarily focuses on protecting the data stored in the network or data involved in transitions through the network. This type serves two purposes.

A

Technical Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This level of network security protects user behavior like how the permission has been granted and how the authorization process takes place.

A

Administrative Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This method limits access to network applications and systems to a specific group of users and devices. These systems deny access to users and devices not already sanctioned.

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are software designed to detect, remove or prevent viruses and malware, such as Trojan horses, ransomware and spyware, from infecting a computer and, consequently, a network.

A

Antivirus and antimalware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is crucial to monitor and protect applications that organizations use to run their businesses. as modern malware threats often targetopen sourcecode and containers that organizations use to build software and applications.

A

Application security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This method analyzes network behavior and automatically detects and alerts organizations to abnormal activities.

A

Behavioral analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud providers often sell add-oncloud securitytools that provide security capabilities in their cloud. The cloud provider manages the security of its overall infrastructure and offers tools for the user to protect their instances within the overall cloud infrastructure

A

Cloud security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These tools monitor data in use, in motion and at rest to detect and prevent data breaches.

A

Data loss prevention (DLP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPSesare designed to prevent intrusions by detecting and blocking unauthorized attempts to access a network.

A

Intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business applications for smartphones and other mobile devices have made these devices an important part of network security.

A

Mobile device security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an easy-to-employ and increasingly popular network security solution that requires two or more factors to verify a user’s identity

A

Multifactor authentication (MFA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This approach gives organizations more control of and increased visibility into traffic flow. Industrial network security is a subset of network segmentation, providing increased visibility into industrial control systems (ICSes).

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This approach lets organizations scan for malware by opening a file in an isolated environment before granting it access to the network.

A

Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This security management technique logs data from applications and network hardware and monitors for suspicious behavior. When an anomaly is detected, theSIEMsystem alerts the organization and takes other appropriate action.

A

Security information and event management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

method that sits on top of the network it protects, concealing it from attackers and unauthorized users. It uses identity criteria to limit access to resources and forms a virtual boundary around networked resources.

A

Software-defined perimeter (SDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

secures the connection from an endpoint to an organization’s network. It uses tunneling protocols to encrypt information that is sent over a less secure network.

A

Virtual private network (VPN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This practice controls employee web use on an organization’s network and devices, including blocking certain threats and websites, while also protecting the integrity of an organization’s websites themselves.

A

Web security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

are one of the riskiest parts of a network and require stringent protections and monitoring. It’s important to followwireless security best practices, such as segmenting Wi-Fi users by service set identifiers, or SSIDs, and using 802.1Xauthentication.

A

Wireless security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

measures and secureload balancersare crucial to protecting the data contained in these workloads.

A

Workload security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Similar to network access control, only grants a user the access they must have do their job. It blocks all other permissions.

A

. Zero-trust network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network security ensures the ongoing high performance of the networks that businesses and individual users rely on.

A

Functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Network security prevents the security breaches that can expose PII and other sensitive information, damage a business's reputation and result in financial losses.
Privacy and security
26
Securing access to intellectual property related to products, services and business strategies helps organizations maintain their competitive edge.
Intellectual property protection
27
Complying with data security and privacy regulations, such as HIPAA and GDPR, is legally required in many countries
Compliance
28
The biggest network security challenge is the rate at which cyber attacks evolve. Threat actors and their methods constantly change as technology changes
Evolving network attack methods.
29
As mentioned, security is every network user's responsibility. It can be difficult for organizations to ensure that everyone is adhering to network security best practices, while simultaneously evolving those strategies to address the newest threats.
User adherence
30
Remote work is also more prevalent. This makes wireless security more important, as users are more likely to be using a personal or public network when accessing company networks.
Remote and mobile access
31
Cloud providers, managed security services and security product vendors often get access to an organization's network, opening new potential vulnerabilities.
Third-party partners
32
one of the highest-paying positions in network security. responsible for developing and implementing an overall information security program.
Chief information security officers  (CISOs)
33
are hired to break into a corporate network to expose vulnerabilities. This can be automated or performed manually by employees or third-party pen testing-as-a-service providers.
Penetration testers
34
focus on quality control within the IT infrastructure.
Security engineers 
35
plan, analyze, design and test an organization's IT infrastructure
Security architects 
36
analyze and plan security strategy, as well as perform security audits.
Security analysts 
37
occurs when individuals close to an organization who have authorized access to its network intentionally or unintentionally misuse that access to negatively affect the organization's critical data or systems.
Insider threats
38
are malicious software programs (malware) aimed at destroying an organization's systems, data and network. malicious code that replicates by copying itself to another program, system or host file. It remains dormant until someone knowingly or inadvertently activates it, spreading the infection without the knowledge or permission of a user or system administration.
Viruses and worms
39
self-replicating program that doesn't have to copy itself to a host program or require human interaction to spread. Its main function is to infect other computers while remaining active on the infected system.
computer worm 
40
is a collection of Internet-connected devices, including PCs, mobile devices, servers and IoT devices that are infected and remotely controlled by a common type of malware.
Botnets
41
malicious code is downloaded from a website via a browser, application or integrated operating system without a user's permission or knowledge.
Drive-by download attacks
42
are a type of information security threat that employs social engineering to trick users into breaking normal security practices and giving up confidential information, including names, addresses, login credentials, Social Security numbers, credit card information and other financial information.
Phishing attacks
43
multiple compromised machines attack a target, such as a server, website or other network resource, making the target totally inoperable.
Distributed denial-of-service (DDoS) attacks
44
the victim's computer is locked, typically by encryption, which keeps the victim from using the device or data that's stored on it. To regain access to the device or data, the victim has to pay the hacker a ransom, typically in a virtual currency such as Bitcoin.
Ransomware
45
programming tool that enables a person without any experience writing software code to create, customize and distribute malware.
Exploit kits
46
an unauthorized intruder penetrates a network and remains undetected for an extended period of time. Rather than causing damage to a system or network, the goal of attack is to monitor network activity and steal information to gain access, including exploit kits and malware.
Advanced persistent threat attacks
47
technique cybercriminals use to inject malicious code into legitimate online advertising networks and web pages. This code typically redirects users to malicious websites or installs malware on their computers or mobile devices.
Malvertising
48
This principle focuses on ensuring that information is only accessible to those who have the proper authorization and need to know. It involves preventing unauthorized access to sensitive data.
Confidentiality
49
ensures that data is accurate and reliable and is not modified incorrectly, whether accidentally or maliciously.
Integrity
50
ensures that information and resources are accessible and usable when needed. This principle aims to prevent disruptions or downtime that could impact an organization's operations.
Availability
51
the practice of protecting information by mitigating information risks. It encompasses a wide range of strategies, technologies, and best practices aimed at safeguarding data and information systems from unauthorized access, disclosure, alteration, or destruction.
Information security
52
These are the qualities that are directly related to the user's experience and satisfaction while using the software.
Quality in Use Characteristics
53
The software's ability to perform its intended functions correctly and efficiently.
Effectiveness
54
ensures that information remains accurate and trustworthy throughout its lifecycle. It involves protecting data from unauthorized alteration, deletion, or corruption.
Integrity
55
The user's overall satisfaction with the software.
Satisfaction
56
These are the internal qualities of the software, which indirectly influence the quality in use characteristics
Product Quality Characteristics
57
The set of features and functions provided by the software.
Functionality
58
The software's ease of use and learnability for users.
Reliability
59
Similar to the quality in use characteristic, this addresses the internal efficiency of the software.
Efficiency
60
The ease with which the software can be modified or adapted.
Maintainability
61
The ability of the software to be used in different environments and platforms.
Portability
62
emphasizes preventing security incidents and vulnerabilities before they occur. It involves implementing security measures and best practices to mitigate risks.
Preventive Focus
63
aim to identify and address potential threats and vulnerabilities in advance, reducing the likelihood of security breaches
Risk Mitigation
64
responding to security incidents after they have occurred. It involves identifying and mitigating the impact of security breaches or data breaches.
Incident Response
65
Reactive measures are geared towards minimizing damage, containing incidents, and recovering from security breaches, such as data recovery and forensic analysis.
Damage Control
66
is like setting up guards specifically to protect your computer, networks, and data from online thieves and hackers. It's all about defending your digital assets from cyber threats.
Cybersecurity
67
Implement strong authentication mechanisms, such as two-factor authentication (2FA) or multi-factor authentication (MFA), to ensure that only authorized users can access information.
Access Control
68
Encrypt data at rest and in transit using strong encryption algorithms. This protects data even if it falls into the wrong hands or is intercepted during transmission.
Data Encryption
69
Deploy firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to monitor and filter network traffic for potential threats.
Network Security
70
Keep all software, operating systems, and applications up to date with the latest security patches and updates to address known vulnerabilities.
Regular Patch Management
71
Conduct cybersecurity training for employees to educate them about security best practices, phishing threats, and the importance of strong passwords.
User Training and Awareness
72
Regularly monitoring systems and networks for security events and vulnerabilities, as well as conducting periodic security assessments and audits.
Continuous Monitoring
73
Protecting the organization's network infrastructure from external threats through firewalls, intrusion detection systems, intrusion prevention systems, and secure network design.
Network Security
74
Securing individual devices (endpoints) such as computers, smartphones, and IoT devices through antivirus software, encryption, and patch management.
Endpoint Security
75
Protecting data at rest, in transit, and during processing through encryption, access controls, and data loss prevention measures.
Data Security
76
Identifying, assessing, and mitigating information security risks through risk analysis, risk assessment, and risk treatment strategies.
Risk Management
77
Ensuring that the organization complies with relevant laws, regulations, and industry standards related to information security, such as GDPR, HIPAA, or PCI DSS.
Compliance
78
type of attack that involves intercepting a communication or message and altering it for malicious effect.
Active Attack
79
the attacker interrupts the original communication and creates new, malicious messages, pretending to be one of the communicating parties.
Interruption
80
the attacker uses existing communications, and either replays them to fool one of the communicating parties, or modifies them to gain an advantage.
Modification
81
creates fake, or synthetic, communications, typically with the aim of achieving denial of service (DoS). This prevents users from accessing systems or performing normal operations.
Fabrication
82
monitors a system and illicitly copies information without altering it. They then use this information to disrupt networks or compromise target systems.
Passive Attack
83