cybersecurity Flashcards

(71 cards)

1
Q

cybersecurity

A

availability, integrity, authentication, confidentiality, and nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when was cybersecurity developed?

A

U.S. Air Force in 1976

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MIT Research scientist David Clark and David Wilson

A

Concept of developing security policies concerning info security (INFOSEC) was formalized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common model of cybersecurity?

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is Confidentiality

A

info only available to some

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is an example of confidentiality

A

example: FERPA and HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is integrity

A

data that should be maintained in a correct state and should not be modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is availability

A

makes sure that authorized people have access to info when and where it is rightly needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is availability ensured?

A

it is implemented using traditional methods such as hardware maintenance, software patching and network optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

availability

A

process such as system redundancy, failover, RAID and High availability cluster are used to weaken serious consequences when hardware issues occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is Dedicated Hardware Devices Can Be Used to Guard Against Downtime and Unreachable Data Due to Malicious Distributed Denial-of-Service (DDoS) Attacks, a part of?

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

should you have access to the info?

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

do i trust the data?

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

am i able to access the data when i want?

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

social engineering

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Social Engineering

A

Use to Get Victims to Take Some Sort of Questionable Action Through Deception, Often Involving a Breach of Security That Oftentimes Includes Revealing Confidential or Private Information or Sending Money (in person or technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what can Social Engineering do?

A

manipulate our emotions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

phishing

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

phishing

A

Uses Email, Phone or Text to Entice Individuals into Providing Personal or Sensitive Information, Ranging From Passwords, Credit Card Information and Social Security Numbers to Details About a Person or Organization (only on technology)
i.e. scam emails or fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

spear phishing

A

email or Electronic Communications Scam Targeting Specific Individual, Organization or Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SMiShing

A

scam through text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what can phishing download

A

malware/ viruses, modern ware/ stuxnet, ransomware, denial of service/ botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

password protection

A

12-15 characters
keep it weird
don’t bunch up special characters
don’t use the same password
change once a year
use multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
people
people - threats social engineering phishing spear phishing smishing password
26
social engineering phishing spear phishing smishing password
confidentiality
27
Technology
Zero Day Exploit Deletion/Hardware Failure RFID Hacking (Distributed) Denial of Service (DDoS / DOS)
28
availability
Zero Day Exploit Deletion/Hardware Failure RFID Hacking (Distributed) Denial of Service (DDoS / DOS)
29
Encryption
Process of Converting Human Readable Text (plaintext) Into An Incomprehensible Text (ciphertext) Using a Cryptographic Key (numbers)
30
VPN (Virtual Private Network)
Creates a "Data Tunnel" in Which Data Can Be Transmitted Or Shared (Sent/Received) Across a Public Network As If The Two Computers Were Directly Connected in a Private Network
31
what does vpn do
hide your IP address by letting the network redirect it
32
how does vpn help with privacy
your internet provider and other third parties cannot see what websites you visit or what data you send or receive online
33
system redundancy
An Organizational Decision to Purposely Duplicate Critical Components or Functions of a Computer System With the Express Intention of Increasing The Reliability of the System - Usually in the Form of a Backup or to Improve Actual System Performance
34
what is an example of system redundancy
backup system or the story of renting a back up place in kansas during a tornado
35
process
-Harder to Design For / Against -Generally Created in Response to A Previous Attack of Security Incident -Attempting to Stop or Promote a Behavior - Rules / Regulations / Policy
36
threat
A Possible Danger That Might Exploit a Vulnerability To Reach Security and Cause Possible Harm
37
control
Software, Hardware, Rules, or Procedures That Reduce or Eliminate the Threat to Information Security
38
privacy
The Right to Determine When, and to What Extent
39
current privacy concerns
- facial recognition (biometrics) - video surveillance -public records -electronic surveillance -radio frequency identification (RFID)
40
cookies
Small Files That Websites "Place" On Your Computer That Allow the Website to Remember Your "Preferences".
41
input
Any Information Sent From an Input Device to a Computer For Processing
42
process
A Set of Instructions (Program) Executed By a Computer To Accomplish a Specific Task
43
output
Anything That Comes Out of the Computer
44
storage
The Ability to Record And/Or Retain Digital Data
45
keyboard
input
46
mouse
input
47
scanner
input
48
barcode
input
49
hard disk
storage
50
memory card/ flash drive
storage
51
cd/dvd
storage
52
ROM/RAM
storage
53
CPU
process
54
monitor
output
55
speaker
output
56
printer/projector
output
57
parts of hardware
Central Processing Unit (CPU) Network Interface Graphics Card SystemBus Motherboard Cache Random-Access Memory (RAM) secondary storage
58
Motherboard
the main circuit board of the computer
59
CPU (Central Processing Unit)
executes instructions
60
system bus
communication pathway that allows computer components to talk to each other
61
system bus
-measured in megahertz -higher the speed, faster the computer
62
cache
stores frequently used instructions on cpu
63
cache
the more memory, the more expensive
64
RAM (Random Access Memory)
holds info that is currently being used
65
RAM memory
-short term memory -volatile, it'll be lost when computer is off -double data rate (DDR)
66
Secondary Storage
disk w/ lots of storage, data will survive if power if off
67
binary
all content stored and processed by computer are 1 and 0
68
operating system
the software that supports a computer's basic functions
69
operating system example
microsoft window or apple mac
70
Application Software
productivity, games, internet, emails etc.
71
Parkerian Hexad
The First INFOSEC Model Developed by Donn Parker in 1998, included the Concepts of: Confidentiality, Possession, Integrity, Authentication, Availability, and Utility.