Introduction And Cybersecurity Fundamentals Flashcards

1
Q

What is the practice of protecting information by mitigating information risk? it also involves safeguard data from unauthorized access disclosure, alteration, and destruction.

A

Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the CIA try stand for?

A

Confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This ensures that sensitive information is only accessible to those who are authorized to view

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This maintains the accuracy and consistency of data throughout its life. Cycle data should be stored and transferred as intended.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This ensures that information and resources are available to authorize users whenever they are needed. This includes maintaining system of time preventing disruption to access.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This refers to the overall security status and readiness of an organization

A

Security Posturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the main components of security posturing?

A

Assessment, planning, implementation , monitoring, adaptation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This position overseas the entire security strategy of the organization, ensuring that all aspects of security are learned with business objectives

A

Chief security officer (CSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This position focuses on the protection of information, assets, developing and implementing information, security policies, and practices

A

Chief information security officer (CISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These positions primarily focus on handling policy enforcement

A

Managerial, technical, operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerability

A

A weakness or flaw in the system software process that can be exploited by the actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat

A

Any potential danger that can exploit a vulnerability to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk

A

The combination of likelihood that a threat will exploit a vulnerability and the impact it would have a measure of a potential harm to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threats can be classified as?

A

Internal, external, malicious, unintentional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This component within security posturing involves developing strategies and policies to address identified risk and improve security

A

Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This component of security posturing deploy security measures such as firewalls, encryption, and access measures

A

Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This key component of security posturing evaluate the current security measures and identifies potential

A

Assessment

18
Q

This component within security posturing updates and refines security measures based on new interest, technical advancements, and changes in organizations need

A

Adaptation

19
Q

——— is about how prepared and protected an organization is against cyber threats and involves assessing current security planning improvements, implementing protective measures modeling for threats and adapting to new risks and changes. This approach helps keep the organization, data system, and infrastructure safe.

A

Security posture

20
Q

————— are malicious hackers who illegally exploit vulnerabilities for personal gain or to cause harm

21
Q

These ethical hackers work to strengthen the organization’s security (internal threat with positive intentions)

22
Q

What does APTs stand for?

A

Advanced Persistent Threats

23
Q

These are highly skilled and well funded cyber threats often lead to government agencies. These targeted attacks are aimed at espionage or gaining strategic advantages, such as stealing sensitive information or disrupting rivals

24
Q

The route through which threat actors gain unauthorized access to systems or data

A

Attack vectors

25
———- is crucial for understanding and improving the security of a network Helps check and improve network security by setting a baseline of secure configurations and settings for devices
Vulnerability assessment
26
This aspect ensures that people cannot deny their actions related to data, helping maintain accountability
Non-repudiation
27
Individuals or groups that pose a danger to cyber security with varying motivations and capabilities
Threat actors
28
These groups are often associated with government agencies, such as military or intelligence services. They are well funded, and highly skilled.
State-backed groups
29
Gathering sensitive information often for national security or economic advantage
Espionage
30
Hackers who may assist an organization but operate without official authorization, sometimes crossing legal boundaries
Grey Hat
31
Inexperienced individuals who use existing tools and scripts to launch basic cyberattacks to promote their agenda
Script Kiddies
32
Group of hackers united by a common cause, often political or social, to promote their agenda
Hacktivists
33
Ethical hackers working to strengthen the organization’s security/ positive intentions
White Hat
34
Groups who operate across multiple legal jurisdictions, making them difficult to prosecute l. Motivated by profit through illegal activities such as ransomware, fraud and data theft
Criminal groups
35
Engage in cyber espionage to gain a competitive edge
Competitors
36
Threats that originate from within the organization that are particularly dangerous
Insider threats
37
What types of insider threat actors are there and the difference between them?
Malicious Insider Threat- motivated by sabotage, financial gain or gaining business advantage. Individuals who have or have had authorized access Unintentional Insider Threat- occurs when employees accidentally compromise security, often due to weak policies and procedures, weak adherence, lack of training and shadow IT
38
Common attack vectors
Physical access to device Infected USB drives or portable devices Phishing emails Attacking wireless networks Compromising third-party vendors Exploiting web applications or social media Targeting cloud services with weak security
39
Vulnerability Assessment check….
Users Device Status Network Settings Outside Connections
40
What does SLA and NDA stand for
Service level agreement Non-disclosure agreements
41