Module 1 - Cybersecurity threats, vulnerabilities and attacks. Flashcards
(178 cards)
What is An area of control, authority, or protection that attackers can exploit to gain access to a system?
A threat domain
Which type of threat domain includes events like denial-of-service attacks and computer viruses?
Software attacks.
Which threat domain covers issues such as software bugs and applications going offline?
Software errors.
Which example falls under the software errors threat domain: a cross-site script or equipment theft?
Cross site script (XSS) falls under software error.
What threat domain includes a legitimate user compromising an organization’s database?
Sabotage
Defacement of an organization’s website belongs to which threat domain?
Sabotage
A firewall misconfiguration or incorrect data entry would be categorized under which threat domain?
Human error
Which user behavior can lead to serious financial, legal, and reputational consequences by compromising sensitive organizational data?
Data theft by users.
Theft of laptops or equipment from an unlocked room belongs to which threat domain?
Theft.
Which type of threat originates from employees, former staff, or partners who misuse access to data or infrastructure?
An Internal Threat.
Earthquakes, floods, and fires fall under which threat domain?
Natural disasters.
What threat domain includes events like hard drive crashes?
Hardware failures.
Which threat domain includes power outages and water damage from sprinkler failure?
Utility interruption.
What makes internal threats potentially more damaging than external ones?
Internal threats are more damaging than external threat because they involve people who have direct access to systems, data and existing security countermeasures.
Who might conduct external threats using trickery or manipulation to gain internal access?
Skilled attackers or amateurs using social engineering techniques.
Which issue occurs when users are not fully informed of or held accountable for organizational security policies and their violations?
Poorly enforced security policies.
Which group includes employees, customers, and contract partners who have access to an organization’s information systems and can potentially compromise security?
The User Domain, often considered the weakest link in information security due to user behaviors and vulnerabilities.
Which threat arises when users are unaware of the security technologies, policies, and countermeasures designed to protect systems and information?
Lack of security awareness
Which common user action leads to infections by introducing malicious files via media like photos, music, or USB drives?
Unauthorized downloads and use of unapproved media.
Which form of sabotage can be carried out by insiders or rivals and aims to delete or misconfigure critical systems or data?
Destruction of systems, data or applications.
Which unauthorized tool can mask data theft by encrypting traffic and blocking visibility from network administrators?
An unauthorized VPN
Which user threat involves visiting harmful online resources that may prompt script downloads or take control of devices?
Access to unauthorized websites.
Which user-related domain is considered the most vulnerable in terms of maintaining the confidentiality, integrity, and availability of data?
The user domain
Which network domain includes geographically localized devices connected via cables or wireless signals?
The Local Area Network.