Introduction into Cybersecurity Flashcards
CIA Triad, Phishing, Governance Week 1 (64 cards)
What are the three principles of the CIA Triad?
- Confidentiality: Ensuring information is accessible only to authorized users.
- Integrity: Ensuring data is accurate and unaltered.
- Availability: Ensuring information and systems are accessible when needed.
What is Phishing in cybersecurity?
Phishing is a cyberattack where attackers impersonate legitimate entities to deceive victims into revealing sensitive information, like passwords or credit card details.
What does Governance mean in GRC?
Governance is the framework of policies and practices that guide an organization’s decision-making, ensuring alignment with business goals, ethical behavior, and transparency.
What is Risk Management in GRC?
Risk Management is identifying, assessing, and mitigating risks (financial, operational, etc.) to minimize negative impacts on an organization.
What is Compliance in GRC?
Compliance involves adhering to external laws and regulations, as well as internal policies, to avoid legal penalties and maintain trust with stakeholders.
Why is Phishing considered a dangerous activity?
It tricks users into revealing sensitive information like passwords and financial data.
What is phishing?
Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
True or False: Phishing attacks can occur via email, social media, and text messages.
True
Fill in the blank: Phishing often uses ________ to trick users into providing personal information.
deceptive messages
What is the primary goal of a phishing attack?
The primary goal is to steal sensitive information such as usernames, passwords, and credit card details.
Multiple choice: Which of the following is NOT a common type of phishing? A) Spear phishing B) Whaling C) Fishing D) Vishing
C) Fishing
What is spear phishing?
Spear phishing is a targeted attempt to steal sensitive information from a specific individual or organization.
True or False: Phishing attempts are always easy to identify.
False
What is whaling in the context of phishing?
Whaling is a type of phishing attack that targets high-profile individuals such as executives or important figures within an organization.
Fill in the blank: Phishing can lead to ________ if sensitive information is successfully obtained.
identity theft
What role does social engineering play in phishing?
Social engineering techniques are used in phishing to manipulate individuals into divulging confidential information.
Multiple choice: Which of the following is a common method used in phishing attacks? A) Malware installation B) Fake websites C) Spoofed emails D) All of the above
D) All of the above
What is a common sign of a phishing email?
Common signs include poor spelling and grammar, generic greetings, and suspicious links.
True or False: Phishing attacks are only a concern for individuals and not businesses.
False
What is the importance of awareness training in preventing phishing?
Awareness training helps individuals recognize phishing attempts and respond appropriately to avoid falling victim.
Fill in the blank: ________ is a technique where attackers use phone calls to trick individuals into revealing personal information.
Vishing
What is a phishing kit?
A phishing kit is a set of tools used by attackers to create and launch phishing attacks.
Multiple choice: Which of the following can help protect against phishing? A) Using two-factor authentication B) Ignoring all emails C) Sharing passwords D) None of the above
A) Using two-factor authentication
What is the difference between phishing and spear phishing?
Phishing is a broad attack targeting many users, while spear phishing targets specific individuals or organizations.