Foundations of Cyber Security Flashcards

1
Q

Cybersecurity

A

_____ is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud Security

A

_____ is the process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internal threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls under stricter handling guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technical skills

A

Skills that require knowledge of specific tools, procedures, and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat

A

Any circumstance or event that can negatively impact assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat actor

A

Any person or group who presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transferable skills

A

Skills from other areas that can apply to different careers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adversarial artificial intelligence (AI):

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Email Compromise (BEC):

A

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CISSP

A

Certified Information Systems Security Professional is a globally recognized and highly sought-after information security certification, awarded by the International Information Systems Security Certification Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer Virus

A

Malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptographic attack

A

An attack that affects secure forms of communication between a sender and intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Malware

A

Software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Password attack

A

An attempt to access password secured devices, systems, networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Physical attack

A

A security incident that affects not only digital but also physical environments where the incident is deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Social Media Phishing

A

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Spear Phishing

A

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Supply-Chain attack

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Virus

A

refer to “computer virus”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Watering hole attack

A

A type of attack when a threat actor compromises a website frequently visited by a specific group of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Asset

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Availability

A

The idea that data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Compliance

A

The process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Confidentiality

A

The idea that only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Confidentiality, integrity, availability (CIA) triad

A

A model that helps inform how organizations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Hacktivist

A

A person who uses hacking to achieve a political goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Health Insurance Portability and Accountability Act (HIPPA)

A

A U.S. federal law established to protect patients’ health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Integrity

A

The idea that the data is correct, authentic, and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Privacy Protection

A

The act of safeguarding personal information from unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Security architecture

A

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Security ethics

A

Guidelines for making appropriate decisions as a security professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Security controls

A

Safeguards designed to reduce specific security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Protected health information (PHI)

A

Information that relates to the past, present, or future physical or mental health or condition of an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Security frameworks

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Security governance

A

Practices that help support, define, and direct security efforts of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls under stricter handling guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Antivirus software

A

A software program used to prevent, detect, and eliminate malware and viruses

46
Q

Database

A

An organized collection of information or data

47
Q

Data point

A

A specific piece of information

48
Q

Intrusion detection system (IDS)

A

An application that monitors system activity and alerts on possible intrusions

49
Q

Linux

A

An open-source operating system

50
Q

Log

A

A record of events that occur within an organization’s systems

51
Q

Network protocol analyzer (packet sniffer)

A

A tool designed to capture and analyze data traffic within a network

52
Q

Order of volatility

A

A sequence outlining the order of data that must be preserved from first to last

53
Q

Programming

A

A process that can be used to create a specific set of instructions for a computer to execute tasks

54
Q

Protecting and preserving evidence

A

The process of properly working with fragile and volatile digital evidence

55
Q

Security information and event management (SIEM)

A

An application that collects and analyzes log data to monitor critical activities in an organization

56
Q

SQL (Structured Query Language)

A

A query language used to create, interact with, and request information from a database

57
Q

_____ is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

A

Cybersecurity

58
Q

_____ is the process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

A

Cloud Security

59
Q

A current or former employee, external vendor, or trusted partner who poses a security risk

A

Internal threat

60
Q

The practice of keeping an organization’s network infrastructure secure from unauthorized access

A

Network Security

61
Q

Any information used to infer an individual’s identity

A

Personally identifiable information (PII)

62
Q

An organization’s ability to manage its defense of critical assets and data and react to change

A

Security posture

63
Q

A specific type of PII that falls under stricter handling guidelines

A

Sensitive personally identifiable information (SPII)

64
Q

Skills that require knowledge of specific tools, procedures, and policies

A

Technical skills

65
Q

Any circumstance or event that can negatively impact assets

A

Threat

66
Q

Any person or group who presents a security risk

A

Threat actor

67
Q

Skills from other areas that can apply to different careers

A

Transferable skills

68
Q

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

A

Adversarial artificial intelligence (AI):

69
Q

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

A

Business Email Compromise (BEC):

70
Q

Certified Information Systems Security Professional is a globally recognized and highly sought-after information security certification, awarded by the International Information Systems Security Certification Consortium

A

CISSP

71
Q

Malicious code written to interfere with computer operations and cause damage to data and software

A

Computer Virus

72
Q

An attack that affects secure forms of communication between a sender and intended recipient

A

Cryptographic attack

73
Q

Any person who uses computers to gain access to computer systems, networks, or data

A

Hacker

74
Q

Software designed to harm devices or networks

A

Malware

75
Q

An attempt to access password secured devices, systems, networks, or data

A

Password attack

76
Q

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

A

Phishing

77
Q

A security incident that affects not only digital but also physical environments where the incident is deployed

A

Physical attack

78
Q

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

A

Physical social engineering

79
Q

A manipulation technique that exploits human error to gain private information, access, or valuables

A

Social engineering

80
Q

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack

A

Social Media Phishing

81
Q

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

A

Spear Phishing

82
Q

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

A

Supply-Chain attack

83
Q

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network

A

USB baiting

84
Q

refer to “computer virus”

A

Virus

85
Q

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

A

Vishing

86
Q

A type of attack when a threat actor compromises a website frequently visited by a specific group of users

A

Watering hole attack

87
Q

An item perceived as having value to an organization

A

Asset

88
Q

The idea that data is accessible to those who are authorized to access it

A

Availability

89
Q

The process of adhering to internal standards and external regulations

A

Compliance

90
Q

The idea that only authorized users can access specific assets or data

A

Confidentiality

91
Q

A model that helps inform how organizations consider risk when setting up systems and security policies

A

Confidentiality, integrity, availability (CIA) triad

92
Q

A person who uses hacking to achieve a political goal

A

Hacktivist

93
Q

A U.S. federal law established to protect patients’ health information

A

Health Insurance Portability and Accountability Act (HIPPA)

94
Q

The idea that the data is correct, authentic, and reliable

A

Integrity

95
Q

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

A

National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)

96
Q

The act of safeguarding personal information from unauthorized use

A

Privacy Protection

97
Q

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats

A

Security architecture

98
Q

Guidelines for making appropriate decisions as a security professional

A

Security ethics

99
Q

Safeguards designed to reduce specific security risks

A

Security controls

100
Q

Information that relates to the past, present, or future physical or mental health or condition of an individual

A

Protected health information (PHI)

101
Q

Guidelines used for building plans to help mitigate risk and threats to data and privacy

A

Security frameworks

102
Q

Practices that help support, define, and direct security efforts of an organization

A

Security governance

103
Q

A specific type of PII that falls under stricter handling guidelines

A

Sensitive personally identifiable information (SPII)

104
Q

A software program used to prevent, detect, and eliminate malware and viruses

A

Antivirus software

105
Q

An organized collection of information or data

A

Database

106
Q

A specific piece of information

A

Data point

107
Q

An application that monitors system activity and alerts on possible intrusions

A

Intrusion detection system (IDS)

108
Q

An open-source operating system

A

Linux

109
Q

A record of events that occur within an organization’s systems

A

Log

110
Q

A tool designed to capture and analyze data traffic within a network

A

Network protocol analyzer (packet sniffer)

111
Q

A sequence outlining the order of data that must be preserved from first to last

A

Order of volatility

112
Q

A process that can be used to create a specific set of instructions for a computer to execute tasks

A

Programming

113
Q

The process of properly working with fragile and volatile digital evidence

A

Protecting and preserving evidence

114
Q

An application that collects and analyzes log data to monitor critical activities in an organization

A

Security information and event management (SIEM)

115
Q

A query language used to create, interact with, and request information from a database

A

SQL (Structured Query Language)