Cyber Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
full-widthPodcast
1
Card Sorting

1/43

flashcard set

Earn XP

Description and Tags

A set of flashcards covering the TCP/IP model layers, key protocols, and fundamental concepts and threats in cyber security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

44 Terms

1
New cards

What are the four layers of the TCP/IP model?

Application layer, Transport layer, Internet layer, Link layer.

2
New cards

What protocols operate at the application layer of the TCP/IP model?

HTTP, HTTPS, SMTP, IMAP, and FTP.

3
New cards

Which protocols operate at the transport layer?

TCP and UDP.

4
New cards

What is the main function of the Internet layer?

Addresses and packages data for transmission, and routes packets across the network.

5
New cards

What hardware is associated with the link layer?

Network interface card (NIC) and OS device drivers.

6
New cards

What is cyber security?

processes & technologies designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access.

7
New cards

What are common types of cyber security threats?

  • malicious code (malware),

  • pharming

  • weak and default passwords

  • misconfigured access rights

  • removable media

  • outdated software.

8
New cards

What is pharming?

A cyber attack intended to redirect a website's traffic to a fake website.

9
New cards

What is penetration testing?

The process of attempting to gain access to resources without knowledge of usernames, passwords, and other normal means of access.

10
New cards

What are the two types of penetration testing?

  1. Testing with knowledge of credentials (internal attack). 2. Testing without knowledge of credentials (external attack).
11
New cards

Define social engineering.

The art of manipulating people to give up confidential information.

12
New cards

What is blagging?

Creating and using an invented scenario for a targeted victim to give up sensitive information.

13
New cards

What is phishing?

Fraudulently obtaining private information, often through email or messages.

14
New cards

What is shoulder surfing?

Observing a person's private information over their shoulder, e.g. watching someone enter their PIN.

15
New cards

What does the application layer do?

It is where network applications, such as web browsers or email programs, operate.

16
New cards

What is the primary role of the transport layer?

Sets up communication between two hosts and agrees on settings like packet size.

17
New cards

How are packets managed in the Internet layer?

Packets are addressed and packaged for transmission and routed across the network.

18
New cards

What alternative names might the link layer be known by?

Network access layer or network interface layer.

19
New cards

Why is it important to protect against social engineering?

To prevent unauthorized access to confidential information by manipulating individuals.

20
New cards

What type of malware is designed to damage or disrupt a network?

Malicious code (malware).

21
New cards

How can weak passwords pose a cybersecurity threat?

They are easier for attackers to guess or brute-force, leading to unauthorized access.

22
New cards

Why might removable media be a cybersecurity risk?

They can transport malware or allow unauthorized access to sensitive data.

23
New cards

What does unpatched software do to a network?

It can leave vulnerabilities that attackers can exploit.

24
New cards

What type of attack simulates a malicious insider?

Penetration testing with knowledge of the target system.

25
New cards

What attack simulates an external threat?

Penetration testing without knowledge of the target system.

26
New cards

What is a common defense against phishing?

Being cautious of unsolicited emails asking for personal information.

27
New cards

What technological measures can be used for cyber security?

Firewalls, intrusion detection systems, and encryption.

28
New cards

How does shoulder surfing relate to social engineering?

It is a method of obtaining sensitive information through observation.

29
New cards

What is the key purpose of cyber security?

To protect assets from unauthorized access and damage.

30
New cards

What role does a network interface card (NIC) play?

It connects a computer to a network.

31
New cards

What kind of damage can malware cause?

It can corrupt, steal, or delete data, disrupt operations and install other malicious software.

32
New cards

What does HTTP stand for?

HyperText Transfer Protocol.

33
New cards

What is the secure version of the HTTP protocol?

HTTPS (HyperText Transfer Protocol Secure).

34
New cards

What can phishing emails often look like?

They may appear to be from legitimate companies or users.

35
New cards

What should be done with default passwords?

They should be changed to strong, unique passwords immediately.

36
New cards

What is a common protection measure against social engineering attacks?

Training employees to recognize and respond to manipulation tactics.

37
New cards

What does the transport layer ensure about data packets?

It ensures they are delivered correctly and in the right order.

38
New cards

Which protocol is mainly responsible for data routing?

The IP (Internet Protocol).

39
New cards

What is a common characteristic of social engineering attacks?

They often exploit human psychology rather than technical vulnerabilities.

40
New cards

What is the significance of having updated software?

It helps mitigate security risks by fixing vulnerabilities.

41
New cards

How does penetration testing improve security?

By identifying and addressing vulnerabilities before they can be exploited.

42
New cards

What is the main mode of protection against malware?

Antivirus software and regular system updates.

43
New cards

What does a firewall do?

It monitors and controls incoming and outgoing network traffic based on security rules.

44
New cards

Can cyber security threats evolve?

Yes, cyber threats continuously evolve, requiring constant vigilance.