Cybersecurity Flashcards

1
Q

unwelcomed attempts to steal, expose, alter, disable or detroy information thorugh unauthorized access to copmuter systems

A

cyber attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how do cybercriminals get into a system?

A

-Internal threats
-external threats
-malware
-social engineering
-software vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

careless, ignorant, negligent behavior

A

using insecure wifi
-sending info to wrong party or storing it incorreclty
misplace or lost computing or storage hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

without approvale, trusted parties, such as an employee or contractor shares sensitive customer data or properitary copmany technology
-associated with disgruntled employees

A

malicious behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

information security attack associated with: social engineering, malicious software, software vulnerabilities

A

external threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

software designde to disrupt computer operation, gather sensitive informaion, or gain unauthorized access to computer systems

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

art of manipulating people into performing actions or divulging info that can harm the secuirty of their systems

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

errors in software or desgin weaknesses that can be exploited to gain access or install malicious software

A

software vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some types of malware

A

spyware
ntnets
viruses
worms
trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

to gather information

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

take over many computers for use in proxy attacks. can sometimes swamp a network

A

botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Infect a software and when run it infects other software, carries payload that causes harm

A

virsues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

propagate through the network without user action and carries payload to cause harm, can swamp network

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

invites users to run seemingly legitinate software that in-turn installs malicious code

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Restricts access to the infected computer system in some way for the restrictions to be removed

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sometimes try to take advantage of the critical nature of data and data access

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

lying to and deceiving legitimiate users
tricking them into divulging restricted information or granting unauthorized access

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

falling for a phishing attack is an example of

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

targeted toward a specific individual, organization or business

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

inappropiate use of backdoors is an example of

A

software vulnerabilites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

code designed into software programs to allow access to the the application by

A

circumventing password protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

bugs in code is an example of

A

software vulnerabilites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

unintentionally created flaw in code

A

bugs in code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

attacks that exploit a vulnerability a developer has NOT had time to address and patch

A

zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

the method hackers use to attack systems with a perviously unidentified vulnerability

A

zero-day exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what was the heartbleed bug?

A

zero-day vulnerability in the open SSL encryption library used to secure traffic between web servers and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution

A

SQL injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what are the goals of cybercriminals

A

-steal time
-steal data
-steal money
-wreak havoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

unauthorized use of a machine’s computing ability

A

steal time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what are examples of steal time

A

cryptojacking: using your machine for calculations needed for bitcoin mining without your consent
- making a “bot” of your machine: using malware youve installed to make your machine part of a”botnet” used ot launch a distributed denial of service (dos) atttack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

unauthorized access to data- where it’s gathered, transmitted or at rest

A

steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

in equifax, criminals accessed a system through a web-application vulnerability that was known and for a correction had been availabile for 2 months, this is an example of

A

steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

using stole credentials

A

steal money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

log into the vicitims bank account and create electronic funds transfers to the perp’s account is an example of

A

steal money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

using ransomware

A

steal money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

with cryptolocker trojan, encrypted files on the affected system and demanded ransom in the forms of bitcoin, this is an example

A

steal money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

denial-of-service attack

A

wreak havoc

38
Q

This attack is meant to shut down a machine, network, or online service making inaccessible to its intended users

A

DoS attack

39
Q

distributed denial of service attack (DDos)

A

wreak havoc

40
Q

using botnets, the incoming traffic flooding the victim originates from many different sources

A

distributed denial of service attack

41
Q

gain control of systems

A

wreak havoc

42
Q

software aimed at controlling systems to damage them or to gain control of infrastructure

A

wreak havoc- gain control of systems

43
Q

targets supervisory control and data acquisitoin

A

stuxnet

44
Q

targets industrial control systems, those of electrical substations

A

industroyer

45
Q

with it in general, tools have become more capable and availabe, the barrier to entry into the market has ___

A

lowered

46
Q

web-based attack platforms

A

malware kits

47
Q

set of defenses put in place to counter threats to technology infrastructure and data resources

A

cybersecurity

48
Q

may extend beyond the enterprise and affect the selection of partners

A

scope

49
Q

cybersecurity is part of

A

IT risk management

50
Q

the process of identifying and measuring IT risks and devising the optimal risk mitigation strategyu

A

cybersecurity

51
Q

the cost of data breaches involving customer information can be wide-reaching

A

investigation and remediation
-notification
-identify theft and credit monitoring

52
Q

associated w the exploited vulnerability

A

investigation and remediation

53
Q

impacted consumers via mail

A

notifxation

54
Q

companies hit with a data breach will subsidize identity theft protection and credit monitoring for affected custoners

A

identity theft and credit monitoring

55
Q

disruptions in normal business operations if services are down or denided
-credit card companies may reuse to provide card services
- due to defecting customers

A

lost business

56
Q

cybersecurity risks are hard to assess in the ___ of an attack

A

absence

57
Q

security is a ___-

A

negative deliverable

58
Q

security is recurring investment in a ____

A

never-ending arms race

59
Q

it departments may not be able to fully fund comprehensive security solutions by themselves becaues:

A
  • departments have limited budgets
  • most security problems are NOT IT, they people problems
60
Q

balancing three principles designed to guyide cybersecurity policies

A

confidentiality, integrity, availability

61
Q

indivduals must be able to consume information when and where needed

A

availabiity

62
Q

sensitive information should be accesed only by authorized people

A

confidentiality

63
Q

focuses on ensuring data hasn;t been tampered with and that it can be trusted as authentic and reliable

A

integrity

64
Q

by making data available, thers risk to exposing it to

A

unauthorized access and unapproved modifications

65
Q

the process of ranking security threats and matching them to appropriate repsonses

A

cost/benefit analysis

66
Q

designed to manage the trae-off between the degree of desired security and the investment necessary to achieve it

A

Cybersecurity

67
Q

countermeasures to put in place to mitigate the risk of a successful cyber attack

A

threat prevention

68
Q

use multiple tools to put as many roadblocks as possible to hinder the attacker- this is a key security

A

defense in depth

69
Q

IT professionals install detection software
- training and policies

A

malware

70
Q

prevention is practically impossible because attacks can come from anywhere
- repsonse involves worldwide cooperation of network and hosting organizations

A

distributed denial of service attacks

71
Q

once vulnerability is discovered

A

disclosure should be done in a responsible manner

72
Q

should be notified first in the case of properietary software

A

developer

73
Q

should be delayed in order to allow time for a mitigation method

A

public disclosure

74
Q

to reduce ignorance and indifference
-part of onboarding but must be reinfornced periodically

A

trainign

75
Q

check compliance with polices
-look for suspicious activities

A

user activity and behavior monitoring

76
Q

prevent supply chain attack that seeks to damage an organization by targeting less-secure elements in the supply netowrk after identifying a weakest link

A

intervention with suppliers and customers

77
Q

based on the premise that legitimate use looks different from illegitimate use

A

behavioral anomaly detection

78
Q

serves as a trap for attackers- deception mechanism to lure hackers into a vulnerable system

A

honey pot

79
Q

responding to a potential damaging on-going cyber attack is

A

crisis management

80
Q

capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident

A

business continuity plan

81
Q

meeting to discuss simulated emergency situation
-practice incident repsonse plans

A

tabletop exercise

82
Q

meeting to discuss simulated emergency situation
-practice incident repsonse plans

A

tabletop exercise

83
Q

cybercriminals who infiltrate systems and collect data for illegal resale

A

harvesters

84
Q

criminals who purchase assets from data harvesters to be used for illegeal financial gain

A

cash-out fraudsters

85
Q

hordes of surreptitiously infilitrated copmuters, linked and controlled remotely aka zombie works

A

otnets

86
Q

attack where firms computer systems are flooded with thousands of seemingly llegitimate requests, the sheer volume of which will slow or shut down the sites use

A

distributed denial of service (DDoS)

87
Q

someone who uncovers computer weakness without explotiing them

A

white hat hackers

88
Q

computer criminals

A

black hat hackers

89
Q

attacks that are so new that they havent been clearly indentified, so they havent made it into software screening systems

A

zero-day exploits

90
Q

system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use

A

firewalls

91
Q

system that monitors network use for potential hacking attemps.

A

intrusion detection system

92
Q

highly restrictive programs that permit communication only with approved entities in an approved manner

A

whitelists