cyber security Flashcards
(27 cards)
What is cyber security?
Cyber security is the practice of protecting computers, networks, and data from theft, damage, or unauthorized access.
What is cyber crime?
Cyber crime refers to illegal activities conducted through the internet or involving computer systems.
True or False: Cyber security only focuses on protecting personal computers.
False
Fill in the blank: The primary goal of cyber security is to protect __________.
information
Which of the following is a type of cyber crime? A) Hacking B) Phishing C) Identity Theft D) All of the above
D) All of the above
What is phishing?
Phishing is a cyber crime that involves tricking individuals into providing personal information through deceptive emails or websites.
What does the term ‘malware’ refer to?
Malware is software specifically designed to disrupt, damage, or gain unauthorized access to computer systems.
True or False: Cyber security measures can only be implemented at the organizational level.
False
What is a firewall?
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
What is the purpose of encryption in cyber security?
Encryption is used to protect data by converting it into a code to prevent unauthorized access.
Fill in the blank: Cyber security involves the protection of __________, networks, and programs from digital attacks.
information
Which type of cyber crime involves stealing someone’s personal information to impersonate them?
Identity theft
What is a Denial of Service (DoS) attack?
A DoS attack aims to make a computer or network resource unavailable to its intended users by overwhelming it with traffic.
True or False: Strong passwords are an essential part of cyber security.
True
What is the function of antivirus software?
Antivirus software is designed to detect, prevent, and remove malware from computers.
What does ‘social engineering’ refer to in the context of cyber crime?
Social engineering is a manipulation technique that exploits human psychology to gain confidential information.
Fill in the blank: Cyber security threats can come from __________, insiders, or external attackers.
malicious actors
What is the difference between a virus and a worm?
A virus attaches itself to a file and spreads when the file is shared, while a worm can replicate itself and spread independently.
True or False: Cyber security only involves technology.
False
What is two-factor authentication (2FA)?
2FA is a security process in which the user provides two different authentication factors to verify themselves.
What is a data breach?
A data breach is an incident where unauthorized access is gained to confidential data.
Which of the following is a common method of cyber attack? A) SQL Injection B) Password Cracking C) Man-in-the-Middle D) All of the above
D) All of the above
Fill in the blank: Cyber security policies should be regularly updated to address __________.
new threats
What is the role of a Chief Information Security Officer (CISO)?
The CISO is responsible for overseeing and managing an organization’s information security strategy and programs.