Security Principles Flashcards
Cybersecurity
The practice of protecting information-related assets against whatever threatens them.
Malware
A malicious or unwanted software designed to steal data or impair your computer’s performance.
Spam
The unsolicited emails or other electronic messages, with undesired or malicious content.
Phishing
The use of fake but official-looking messages to trick users into performing dangerous actions.
Spear phishing
A variant of phishing that targets specific people, such as members of an organization or even individual users.
Trojan horse
A type of malware that appears to be a harmless or useful program, like a game or even an anti-virus application.
PCI DSS
The Payment Card Industry Data Security Standard is a set of shared rules developed by the world’s major credit card companies and administered by the PCI Council.
Digital certificate
A file created and signed using special cryptographic algorithms.
What malware spreads without any human interaction?
Worm
What provides information regarding payment cards issued by major credit card vendors, and the customers that pay using those cards?
PCI
Name the European Union regulation which protects the privacy of individual data related to EU residents?
GDPR
In which type of attack does an attacker look for the discarded documents and other media in a target’s trash?
Dumpster diving
What defines a phishing attack?
Using fake but official-looking messages to trick users into performing dangerous actions
Sending unsolicited emails or other electronic messages, with undesired or malicious content is defined as ________ .
spam
What component ensures that information remains accurate and complete over its entire lifetime?
Integrity
What component of CIA triad ensures that the connectivity and performance are maintained at the highest possible level?
Availability
What type of encryption that uses the same key for both encryption and decryption?
Symmetric
The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as _________.
cybersecurity
What is the CIA Triad?
The core of information security
CIA Triad: Confidentiality
Ensuring that information is viewable only by authorized users or systems, and is either inaccessible or unreadable to unauthorized users.
CIA Triad: Integrity
Ensuring that information remains accurate and complete over its entire lifetime. In particular, this means making sure that data in storage or transit can’t be modified in an undetected manner.
CIA Triad: Availability
Ensuring that information is always easily accessible to authorized users. This means making sure that connectivity and performance are maintained at the highest possible level.
What is Risk
The chance of harm coming to an asset. Risk measurements can incorporate any combination of the likelihood of harm, the impact it will have on the organization, and the cost of repairing the damage.
What is Threat
Anything that can cause harm to an asset. Threats can include attacks caused by malicious actors, but also human error, equipment malfunction, or natural disaster.