Exam 1 Extra Study Flashcards

1
Q

CVE

A

Common Vulnerabilities + Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security

A

To be free from danger is the goal , the process that achieves that freedom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Security

A

The tasks of securing information in a digital format:

Manipulated by a microprocessor
Preserved on a storage device
Transmitted over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset

A

Item that has value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat

A

Type of action that has the potential to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat Actor

A

A person or element with power to carry out a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability

A

Flaw or weakness that allows a threat agent to bypass security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat Vector

A

The means by which an attack can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk

A

A situation that involves exposure to some type of danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk response techniques:

A

Accept – risk is acknowledged but no steps are taken to address it

Transfer – transfer risk to a third party

Avoid – identifying risk but making the decision to not engage in the activity

Mitigate – attempt to address risk by making the risk less serious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyberterrorism

A

Any premeditated, politically motivated attack against information, computer systems, computer programs, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 Fundamental Security Principles

A

Layering
Limiting
Diversity
Obscurity
Simplicity - Simple from inside / Complex from outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware Attacks

A

Circulation - spreading rapidly to other systems in order to impact a large number of users

Infection - how it embeds itself into a system

Concealment - avoid detection by concealing its presence from scanners

Payload capabilities - what actions the malware performs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Circulation

A

Viruses / Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Infection

A

Trojans / Ransomware / Crypto-malware

17
Q

Rootkits

A

Software tools used by an attacker to hide actions or presence of other types of malicious software

18
Q

7 Layers of Security

A
  • Policies, Procedures, Awareness
  • Physical
  • Perimeter
  • Network
  • Host
  • Application
  • Data