Luck based studying Flashcards

(88 cards)

1
Q

HACKTIVIST:

A

Grey hat hackers who rally and protest different political and social ideas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An example of a vulnerability database?

A

The National Common Vulnerabilities and Exposures (EVE) database.
Publicly available database of all known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An example of an early warning system?

A

Honeynet project creates a warning when someone accesses your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An example of a company that shares cyber intelligence?

A

InfraGard, partnership of the FBI and private sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISM Standards?

A

ISO/IEC 27000 standards are an example of Information Security Management standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What group tracks laws enacted to cyber security?

A

ISACA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of an attack that successfully destroyed infrastructure.

A

Stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is scada used for?

A

Supervisory Control and Data Acquisition

used to control and monitor industrial processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BYOD?

A

Bring Your Own Device

Using a mobile device for company purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IoT?

A

Internet of Things

The collection of technologies that enable the connection of various devices to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an APT

A

Advanced Persistent Threat

Continuous computer hack that occurs under the radar against a specific object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Algorithm attacks?

A

Can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Federated identity?

A

A federated identity links a subject’s electronic identity across separate identity management systems. Exe, using google account ot log into Yahoo.

The most common way to protect federated identity is to tie login ability to an authorized
device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TDoS

A

Telephone denial of service attack uses phone calls to tie up a system while not letting any calls get through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

National Institute of Standards and Technologies?

A

NIST

created a framework for companies and organizations in need of cybersecurity professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

National Cybersecurity Workforce Framework

includes providing support, administration, and maintenance

A

Operate and Maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

National Cybersecurity Workforce Framework

includes the identification, analysis, and mitigation of threats.

A

Protect and Defend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

National Cybersecurity Workforce Framework

Examine cyber events and/or crimes of IT systems

A

Investigate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

National Cybersecurity Workforce Framework

includes specialized denial and deception operations.

A

Collect and Operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

National Cybersecurity Workforce Framework

review and evaluation of incoming cybersecurity information.

A

Analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

National Cybersecurity Workforce Framework

provides for leadership, management, and development

A

Oversight and Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

National Cybersecurity Workforce Framework

includes conceptualizing, designing, and building secure IT systems.

A

Securely Provision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DNS, HTTP. and online databases?

A

Prime targets for cybercriminals and packet sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Packet forgery?

A

also called interferes with an established network communication by constructing packets to appear as if they are part of a communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Internal security threats?
Improper handling of confidential information, abuse of administrator privileges, knowledge of security countermeasures.
26
External security threats?
Amaterur or skilled hackers, cna use vulnerabilities in netowkr devices, social engineering.
27
Impact of Big Data
Big data is the result of datasets that are large and complex, making traditional data processing applications inadequate.
28
▪ ISACA Certified Information Security Manager (CISM)
– Cybersecurity specialists responsible for managing, developing and overseeing information security systems at the enterprise level or for those developing best security practices can qualify for CISM.
29
The first dimension of the cybersecurity cube?
Identifies the goals to protect the cyber world. Confidentiality, integrity, and availability.
30
The second dimension of the cybersecurity cube?
protecting all of the states of data in the cyber world. Data at rest or in storage, data in transit, data in process.
31
The third dimension of the cybersecurity cube?
defines the types of powers used to protect the cyber world. Technologies- devices, and products available to protect information systems and fend off cyber criminals. Policies and Practices -procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices People - Aware and knowledgeable about their world and the dangers that threaten their world.
32
Confidentiality?
prevents the disclosure of information to unauthorized people, resources and processes. Another term for confidentiality is privacy.
33
Integrity?
▪ Integrity is the accuracy, consistency, and trustworthiness of data during its entire life cycle. Another term for integrity is quality.
34
Availability?
used to describe the need to maintain availability of information systems and services at all times. Methods for ensuring availability include system redundancy, system backups, increased system resiliency, equipment maintenance, up-to-date operating systems and software, and plans in place to recover quickly from unforeseen disasters.
35
Accounting?
keeps track of what users do, including what they access, the amount of time they access resources, and any changes made.
36
Integrity check?
is a way to measure the consistency of a collection of data (a file, a picture, or a record) Does a hash function to take a snapshot of data at an instant in time.
37
Data at rest?
a type of storage | device retains the data when no user or process is using it.
38
Direct attached storage- DAS
Direct-attached storage is connected to a computer.
39
RAID?
Redundant array of independent disks RAID provides improved performance and fault tolerance.
40
Network attached storage device NAS
A network attached storage device is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users
41
Storage area netowrk SAN
Storage area network is a network-based storage | system.
42
Data in Transit?
involves sending information from one device to another
43
Ways to transmit data
Sneaker net (USB), wired network, and wireless networks.
44
Data in process?
data during initial input, | modification, computation, or output.
45
The ISO Model?
International Organization for Standardization developed a comprehensive framework to guide information security management.
46
Virus?
- A virus is malicious executable code attached to | another executable file, such as a legitimate program
47
Worms?
- Worms are malicious code that replicates by | independently exploiting vulnerabilities in networks.
48
Trojan horse?
- A Trojan horse is malware that carries out malicious operations under the guise of a desired operation such as playing an online game.
49
Logic bomb?
A logic bomb is a malicious program that | uses a trigger to awaken the malicious code.
50
Ransomware?
Ransomware holds a computer system, or the data it contains, captive until the target makes a payment.
51
Backdoors and Rootkits?
- A backdoor or rootkit refers to the program or code introduced by a criminal who has compromised a system.
52
Spam?
Spam, also known as junk mail, is unsolicited | email.
53
Spyware?
- Spyware is software that enables a criminal to | obtain information about a user’s computer activities.
54
Adware?
- Adware typically displays annoying pop-ups | to generate revenue for its authors.
55
Scareware?
Scareware persuades the user to take a | specific action based on fear.
56
Phishing?
using email, instant messaging, or other social media to try to gather information such as login credentials or account information by masquerading as a reputable entity or person.
57
Spear phishing?
Spear phishing is a highly | targeted phishing attack.
58
Vishing?
Vishing is phishing using voice communication technology.
59
Pharming?
Pharming is the impersonation of a legitimate website in an effort to deceive users into entering their credentials.
60
Whaling?
Whaling is a phishing attack that targets high profile targets within an organization such as senior executives.
61
SEO Poisoning?
SEO poisoning uses SEO to make a malicious website appear higher in search results
62
Browser hijacker
A browser hijacker is malware that alters a computer's browser settings to redirect the user to websites paid for by the cyber criminals' customers.
63
Pretexting?
- This is when an attacker calls an individual and | lies to them in an attempt to gain access to privileged data.
64
Quid pro quo?
This is when an attacker requests personal information from a party in exchange for something, like a gift.
65
Shoulder Surfing and Dumpster Diving?
refers to picking | up PINs, access codes or credit card numbers.
66
Impersonation and Hoaxes?
Impersonation is the action | of pretending to be someone else.
67
Piggybacking and Tailgating?
Piggybacking occurs when | a criminal tags along with an authorized person to gain entry into a secure location or a restricted area.
68
Symmetric algorithms?
These algorithms use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key
69
Asymmetric algorithms?
Asymmetrical encryption algorithms use one key to | encrypt data and a different key to decrypt data.
70
3DES?
Triple Digital Encryption Standard, symmetric block cipher with 64-bit block 56-bit key. Encrypts data three times and uses a different key for at least one
71
IDEA?
International Data Encryption Algorithm 64-bit blocks and 128-bit keys Performs eight rounds of transformations of each of the 16 blocks
72
AES?
Advanced Encryption Standard 128-bit, a key size of 128,192, or 256. U.S government uses this.
73
Physical Access Controls?
Barriers to prevent direct contacts with system.
74
Logical Access Controls?
hardware and software solutions
75
Administrative Access Controls?
Policies and procedures
76
MAC?
Mandatory access control - restricts the actions that a subject can perform on an object. User cannot access _____
77
DAC?
Discreitionay access control grants or restricts object access determined by the object’s owner. Owner of a .doc file chooses who to share it with.
78
RBAC?
is based on the role of the subject. Accountants do not have access to IT files.
79
Rule-based access control?
Rules determine access Staff cannot look at payroll after hours on weekends.
80
What You Know
passwords, passphrases, pins
81
What You Have
smart cards and security key fobs
82
Who You Are
fingerprint, retina
83
Multi-factor authentication
Two ways to confirm identity, password and phone.
84
Data masking?
Data masking is a technology that secures data by replacing sensitive information with a non-sensitive version.
85
Substitution?
replaces data with authentic looking values to apply | anonymity to the data records.
86
Shuffling?
makes up a substitution set from the same column of data that a user wants to mask.
87
Steganography?
Conceals data in another file like a graphic, audio, or other text file.
88
Data obfuscation?
The use and practice of data masking and steganography in cybersecurity and cyber intelligence.