security Flashcards
(61 cards)
What does the CIA Triad stand for?
Confidentiality, Integrity, Availability.
Define risk in cybersecurity.
Risk = (Threat × Vulnerability) / Countermeasures.
What are the three categories of security controls?
- Administrative
- Technical
- Physical
What is the purpose of defense-in-depth?
To use multiple layers of security controls to increase the work factor for attackers.
What is the difference between threat and vulnerability?
A threat is a potential danger, while a vulnerability is a weakness that can be exploited.
How does a DDoS attack work?
Overwhelms a target with traffic from multiple compromised systems (bots).
What is the goal of a phishing attack?
To trick users into revealing sensitive information via deceptive emails or websites.
Name three types of malware mentioned.
- Ransomware
- Trojan
- Spyware
What is social engineering?
Manipulating individuals into divulging confidential information (e.g., Kevin Mitnick’s tactics).
What is a zero-day exploit?
An attack targeting a previously unknown vulnerability.
What are the five core functions of the NIST Cybersecurity Framework (CSF)?
- Identify
- Protect
- Detect
- Respond
- Recover
What is the purpose of ISO 27005?
To provide guidelines for information security risk management.
List three components of a security policy.
- Plans
- Standards
- Procedures
What does SLE stand for in risk assessment?
Single Loss Expectancy (SLE = Asset Value × Exposure Factor).
What is the role of a CERT/CSIRT?
To respond to and manage cybersecurity incidents.
What does a Penetration Tester do?
Ethically hacks systems to identify vulnerabilities.
Name three certifications mentioned.
- CISSP
- CISM
- CEH
What is the primary responsibility of a CISO?
Overseeing an organization’s information security strategy.
What skills are required for a Cybersecurity Engineer?
- Network security
- Scripting
- Risk analysis
What is non-repudiation?
Ensuring a party cannot deny the authenticity of their actions (e.g., via digital signatures).
Which layer of the OSI model is targeted in a SYN Flood attack?
Transport Layer (Layer 4).
What is the difference between HTTPS and HTTP?
HTTPS encrypts data using SSL/TLS.
What does TOR stand for, and what is its purpose?
The Onion Router; anonymizes internet traffic.
What is encryption at rest vs. encryption in transit?
- At rest: Data stored on devices.
- In transit: Data moving across networks.