Week 7 (Cybersecurity) Flashcards

(6 cards)

1
Q

_____ is the use of computer-based techniques to promote a political agenda or social change, often related to freedom of speech, human rights, or freedom of information.

A

Hacktivism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The cyber kill chain is described in 7 steps:
1. _____
2. _____
3. _____
4. _____
5. _____
6. _____ _____ _____
7. _____ _____ _____

A
  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command and Control
  7. Actions on Objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ ____ ____ refers to the concept of having safety in mind when designing code or software.

A

Secure by design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ _____ _____ refers to the concept of hardening software, hardware, and computing components. It refers to how you should lock down a system or parts of a system to prevent possible avenues of cyber attacks.

A

Secure by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ _____ _____ focuses on ensuring the security and integrity of applications during and after deployment.

A

Secure by deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_______ across stakeholders is the key to cybersecurity.

A

Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly