Lesson 1 Flashcards

(44 cards)

1
Q

is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons.

A

Black-hat Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

exploit networks
and computer systems in
the way that black hats
do, but do so without any
malicious intent,
disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies.

A

Gray Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

on the other hand, are deemed to be the good guys, working with organizations to strengthen the
security of a system

A

White Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the methods that adversaries use to breach or
infiltrate your network.

A

Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack in which an unauthorized user gains access to a system or network and remains there for an extended period of time without being detected.

A

Advanced Persistent Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

represented by ALL OF THE POINTS ON YOUR NETWORK where an adversary can
attempt to gain entry to your information systems.

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the methods that adversaries use to BREACH OR
INFILTRATE YOUR NETWORK.

A

Attack Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Major Attack Vectors

A

Social Engineering
Remote Access
Insider Threats
Brite-Force Attacks
Ransomware
Denial of Service
Access through Intermediaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Manipulating people into performing actions or divulging confidential information

A

Social Engineering: Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

THROUGH OPEN PORTS or the exploitation of web code, hackers are able to gain unauthorized access to server

A

Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Criminals are aided by the conscious assistance of an organization’s employee(s)

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

also known as an exhaustive search, is A CRYPTOGRAPHIC HACK THAT RELIES ON GUESSING POSSIBLE COMBINATIONS of a targeted password until the correct password is discovered.

A

Brute Force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RESTRICTING ACCESS to a computer until A RANSOM IS PAID

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a malicious attempt to DISRUPT THE NORMAL TRAFFIC OF A TARGETED SERVER, service or network by
overwhelming the target or its surrounding infrastructure with a flood of
Internet traffic.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attack vector that DOESN’T REQUIRE PHYSICAL ACCESS to target machines

A

Access through Intermediaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A common, respected model that FORMS THE BASIS FOR THE DEVELOPMENT OF SECURITY SYSTEMS and policy

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Term used for preservation of confidentiality, integrity and availability of information.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Defined as the preservation
of confidentiality, integrity and
availability of information in the
Cyberspace.

A

Cybersecurity

19
Q

PREVENTS UNAUTHORIZED USE or DISCLOSURE OF INFORMATION

A

Confidentiality

20
Q

Safeguards the ACCURACY AND COMPLETENESS of information

21
Q

Authorized users have reliable and timely access to information

22
Q

the fundamental sector on which all critical infrastructure depend.

A

Information technology

23
Q

An act defining cybercrime, providing for the prevention, investigation, suppression and the imposition of penalties therefore and for other purposes

A

R.A. 10175
Cybercrime Prevention Act
of 2012

24
Q

An act protecting individual personal information in information and
communication systems in the government and the private sector,
creating for this purpose a National Privacy Commission, and for
other purposes.

A

R.A. 10173
Data Privacy Act of 2012

25
Access to the whole or any part of a computer system WITHOUT RIGHT
Illegal Access
26
Interception made by technical means without right
Illegal Interception
27
Intentional or reckless alteration, damaging, deletion of computer data
Data Interference
28
Intentional alteration or reckless INTERFERENCE with the functioning OF A COMPUTER OR COMPUTER NETWORK
System Interference
29
Use, production, sale, procurement, importation, distribution, or otherwise making available, without right
Misuse of device
30
Use, production, sale, procurement, importation, distribution, or otherwise making available, without right
Misuse of device
31
Use, production, sale, procurement, importation, distribution, or otherwise making available, without right
Misuse of devices
32
ACQUISITION OF A DOMAIN NAME over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same
Cyber Squatting
33
INPUT, ALTERATION, OR DELETION OF ANY COMPUTER DATA WITHOUT RIGHT resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic
Forgery
34
Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby WITH FRAUDULENT INTENT
Fraud
35
Intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.
Identity Theft
36
It is when personal information is processed without the consent of the data subject, or without being authorized using lawful criteria
Unauthorized Processing
37
It is when personal information is made accessible due to negligence and without being authorized by any existing law.
Negligence in Access
38
It is when personal information is knowingly or negligently disposed, discard, or **abandon in an area accessible to the public** or has otherwise placed thepersonal information of an individual in any container for trash collection
Improper disposal
39
It is when personal information is processed for purposes not authorized by the data subject, or otherwise authorized by any existing laws.
Unauthorized Purpose
40
It is when an individual handling personal information knowingly and unlawfully, or violating data confidentiality and security data systems, **breaks in any way into any system where personal and sensitive personal information are stored.**
Unauthorized Access/Intentional Breach
41
It is when an individual handling personal information knowingly and unlawfully, or violating data confidentiality and security data systems, *breaks in any way into any system where personal and sensitive personal information are stored.*
Unauthorized Access/Intentional Breach
42
It is when an individual or entity who has knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f) of the Act, intentionally or by omission conceals the fact of such security breach.
Concealed Breach
43
It is when an individual or entity with malice or in bad faith, discloses unwarranted or false information relative to any personal information or sensitive personal information obtained by him or her
Malicious Disclosure
44
It is when an individual or entity **discloses to third party personal information** not covered by legitimate purpose, lawful criteria, and **without the consent of the data subject.**
Unauthorized Disclosure