reviewer Flashcards
(15 cards)
What are cybersecurity threats?
Cybersecurity threats are potential malicious attacks that aim to damage, steal, or disrupt information systems.
What is a vulnerability in cybersecurity?
A vulnerability is a weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.
Name three common types of cybersecurity threats.
- Malware
- Phishing
- Denial of Service (DoS)
True or False: A cybersecurity vulnerability can exist in hardware, software, or organizational processes.
True
Fill in the blank: A _______ is a software designed to disrupt, damage, or gain unauthorized access to computer systems.
[malware]
What is phishing?
Phishing is a method of trying to gather personal information using deceptive emails and websites.
What is the purpose of a Denial of Service (DoS) attack?
To make a machine or network resource unavailable to its intended users.
What does the term ‘exploit’ refer to in cybersecurity?
An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability.
Identify two consequences of a cybersecurity breach.
- Data loss
- Financial loss
Fill in the blank: Cybersecurity threats can lead to _______ of sensitive information.
[leakage]
What are social engineering attacks?
Social engineering attacks manipulate individuals into divulging confidential or personal information.
True or False: All cybersecurity vulnerabilities can be patched.
False
What is the role of a firewall in cybersecurity?
A firewall acts as a barrier between a trusted network and untrusted networks to control incoming and outgoing traffic.
Name two common methods used to mitigate cybersecurity threats.
- Regular software updates
- User education and training
Fill in the blank: Cybersecurity involves protecting _______ from theft or damage.
[information]