Home
Explore
Exams
Search for anything
Login
Get started
Home
Cybersecurity 1
Cybersecurity 1
0.0
(0)
Rate it
Studied by 0 people
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/21
Earn XP
Description and Tags
First three days of cybersecurity notes
Add tags
Study Analytics
All
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
22 Terms
View all (22)
Star these 22
1
New cards
What is the primary purpose of cybersecurity?
To protect digital components, data, networks, and systems from unauthorized access.
2
New cards
What are the common forms of malware?
Trojans, Adware, and Spyware.
3
New cards
How does malware typically get installed on a system?
Often downloaded unknowingly by users.
4
New cards
What is the goal of phishing attacks?
To obtain personal data such as credit card numbers and login information.
5
New cards
How do phishing attacks typically operate?
By tricking users into giving personal data through fake emails impersonating trusted sources.
6
New cards
What occurs during a man-in-the-middle attack?
A hacker intercepts communication between a user and a server.
7
New cards
Where do man-in-the-middle attacks commonly occur?
On unsecured public Wi-Fi networks.
8
New cards
What is a common method used in password attacks?
Guessing user credentials using common or brute-force methods.
9
New cards
Why are weak passwords a security risk?
They are easily cracked, such as 'password123'.
10
New cards
What is the function of a firewall?
To act as a filter between a computer and external networks, blocking suspicious traffic.
11
New cards
What types of firewalls exist?
Hardware-based and software-based.
12
New cards
What is the purpose of honeypots in cybersecurity?
To lure and trap attackers, wasting their resources without risking real data.
13
New cards
What characteristics define strong passwords?
A mix of letters, numbers, and symbols.
14
New cards
What role does antivirus software play in cybersecurity?
Helps detect and block malware.
15
New cards
What can users do to prevent phishing attacks?
Avoid links and attachments from unknown emails.
16
New cards
Who can be targeted by cyberattacks?
Individuals, companies, or government organizations.
17
New cards
What is an Advanced Persistent Threat (APT)?
Prolonged unauthorized access to networks to steal information over time.
18
New cards
What is the effect of Denial of Service (DoS) attacks?
They flood a server with traffic to make it unresponsive.
19
New cards
How do Distributed Denial of Service (DDoS) attacks differ from DoS attacks?
DDoS attacks use multiple systems to overload a server.
20
New cards
What is an SQL injection attack?
A method that manipulates database queries to access or corrupt data.
21
New cards
What challenges do large companies face regarding cybersecurity?
Complex infrastructure makes them struggle with cybersecurity.
22
New cards
What is the role of cybersecurity professionals?
To manage risks and defend systems.