IAS PRELIM

0.0(0)
studied byStudied by 4 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards

Information Assurance

is the process of protecting information and information systems from unauthorized access, modification, theft, or destruction while ensuring their confidentiality, integrity, and availability, process involves the assessment of potential risks and vulnerabilities, the development and implementation of appropriate controls and countermeasures, and the monitoring and evaluation of their effectiveness

2
New cards

Confidentiality

refers to the protection of sensitive information from unauthorized disclosure or access

3
New cards

Integrity

refers to the accuracy, completeness, and consistency of information and the protection of its authenticity and trustworthiness

4
New cards

Availability

refers to ensuring that information is accessible to authorized users when and where they need it.

5
New cards

Information Technology Infrastructure Library (ITIL)

is a set of best practices for IT service management, including information assurance, focuses on aligning IT services with business needs and providing a framework for service delivery management and improvement

6
New cards

National Institute of Standards and Technology (NIST) Cybersecurity Framework

framework provides a set of guidelines for organizations to manage and reduce cybersecurity risk

7
New cards

ISO/IEC 27001

provides a systematic approach to managing and protecting information assets through the implementation of an Information Security Management System (ISMS)

8
New cards

Information security

refers to the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction, process involves the implementation of appropriate technical, administrative, and physical controls to ensure the confidentiality, integrity, and availability of information

9
New cards

Protection of Sensitive Information

is one of the primary objectives of information security

10
New cards

Protection of Integrity

refers to the accuracy, completeness, and consistency of information

11
New cards

Availability

refers to ensuring that information is accessible to authorized users when and where they need it.

12
New cards

Compliance

Many organizations are required to comply with regulations such as GDPR or PCI DSS.

13
New cards

Business Continuity

Information security is essential to ensure business continuity, this involves incident response planning, disaster recovery planning, and business continuity planning.

14
New cards

Conducting a Risk Assessment

helps identify potential risks and vulnerabilities to information and information systems

15
New cards

Developing Policies and Procedures

provide guidance and direction for the implementation of information security controls.

16
New cards

Implementing Access Controls

are designed to limit access to information and information systems to authorized personnel

17
New cards

Training and Awareness

help employees understand the importance of information security and their role in protecting it

18
New cards

Monitoring and Logging

enable organizations to detect and respond to security incidents in a timely manner

19
New cards

Incident Response Planning

helps organizations prepare for and respond to security incidents.

20
New cards

Cybersecurity threats

are acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems.

21
New cards

Malware

is an abbreviation of "malicious software," which includes viruses, worms, trojans, spyware, and ransomware, and is the most common type of cyberattack.

22
New cards

VIRUS

A program designed to interfere with your computer, device or networks normal operation.

23
New cards

WORMS

A program that can make copies of itself in computers that it comes in contact with.

24
New cards

TROJAN

A type of malware that disguises itself as a useful and or harmless program or file.

25
New cards

ADWARE

A type of malware that launches unwanted advertisements in your internet browser or your desktop

26
New cards

SPYWARE

is software that aims to gather information about a person or organization without their knowledge.

27
New cards

RANSOMWARE

is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access.

28
New cards

CRYPTOJACKING

attacks deploys sodetware on a victimd device and begin the computing resources to generate cryptocurrency without their knowledge.

29
New cards

ROOTKITS

software is injected into applications, firmware or operating system providing remote administritive acces to a computers

30
New cards

FILELESS MALWARE

no software is installed in operating system, native files like WMI and Powershell arre edited to enable malicious functions

31
New cards

Social Engineering Attacks

threats leverage human psychology, manipulation, or misuse of trust, these non-technical threats, tricking users into providing an entry point for malware

32
New cards

Phishing

Deceptive attempts, usually through email or messages, to gather sensitive information such as usernames, passwords, and credit card details.

33
New cards

Vishing (Voice Phishing)

The imposter uses the phone to trick the target into disclosing sensitive data or granting access to the target system.

34
New cards

Smishing(SMS-Phishing)

the attacker uses text messages as the means of deceiving the victim

35
New cards

Baiting

the attacker lures a user into a social engineering trap, usually with a promise of something attractive like a free gift card

36
New cards

Pretexting

similar to baiting, the attacker attacker pressures the target target into giving up information under false pretenses, this typically involves impersonating someone with authority

37
New cards

Piggybacking

an authorized user provides physical access to to another individual who "piggybacks" off the the user's user's credentials.

38
New cards

Tailgating

an unauthorized individual follows an authorized authorized user into a location, for example, by by quickly slipping in through a protected door door after after the authorized user has opened it.

39
New cards

Supply Chain Attacks

are a new type of threat to software developers and vendors. Its purpose is to infect legitimate applications and distribute malware via source code, build processes, or software update mechanisms.

40
New cards

Man-in-the-Middle (MitM) attack

involves intercepting the communication between two endpoints, such as a user and an application.

41
New cards

Wi-Fi eavesdropping

an attacker sets up a Wi-Fi connection, posing as a legitimate actor, such as a business, that users may connect to

42
New cards

Email hijacking

an attacker spoofs the email address of a legitimate organization, such as a bank, and uses it to trick users into giving up sensitive information or transferring money to the attacker

43
New cards

DNS spoofing

a Domain Name Server (DNS) is spoofed, directing a user to a malicious website posing as a legitimate site.

44
New cards

IP spoofing

an Internet Protocol (IP) address connects users to a specific website.

45
New cards

HTTPS spoofing

is generally considered the more secure version of HTTP, but can also be used to trick the browser into thinking that a malicious website is safe.

46
New cards

Denial-of-Service (DoS)

attack overloads the target system with a large volume of traffic, hindering the ability of the system to function normally

47
New cards

Distributed Denial-of-Service (DDoS)

attack involving multiple devices

48
New cards

HTTP flood DDoS

the attacker uses HTTP requests that appear legitimate to overwhelm an application or web server, this technique does not require high bandwidth

49
New cards

UDP flood DDoS

a remote host is flooded with User Datagram Protocol (UDP) packets sent to random ports, this technique forces the host to search for applications

50
New cards

ICMP flood

a barrage of ICMP Echo Request packets overwhelms the target, consuming both inbound and outgoing bandwidth.

51
New cards

NTP amplification

servers are public and can be exploited by an attacker to send large volumes of UDP traffic targeted at a server

52
New cards

SYN flood DDoS

initiating a Transmission Control Protocol (TCP) connection sequence involves sending a SYN request that the host must respond to with a SYN-ACK that acknowledges the request, and then the requester must respond with an ACK.

53
New cards

Injection attacks

exploit a variety of vulnerabilities to directly insert malicious input into the code of a web application.

54
New cards

SQL Injection

an attacker enters an SQL (Structured Query Language) query into an end-user input channel, such as a web form or comment field.

55
New cards

Code Injection

- an attacker can inject code into an application if it is vulnerable, the web server executes the malicious code as if it were part of the application

56
New cards

OS (Operating System) Command Injection

an attacker can exploit a command injection vulnerability to input commands for the operating system to execute.

57
New cards

XML External Entities (XXE) Injection

an attack is carried out using specially constructed Extensible Markup Language (XML) documents.

58
New cards

Cross-Site Scripting (XSS)

an attacker inputs a string of text containing malicious JavaScript

59
New cards

LDAP Injection

an attacker inputs characters to alter Lightweight Directory Access Protocol (LDAP) queries.

60
New cards

Data

a is considered the new oil, and it is the most valuable asset for businesses and organizations

61
New cards

Programs

also known as software, are sets of instructions that tell a computer what to do.

62
New cards

Antivirus software

is designed to detect and remove malware from a computer, it scans programs for known malware signatures and behaviors and blocks them from running or deletes them from the system

63
New cards

Keep the operating system updated

One of the most critical steps to securing the operating system is to keep it updated with the latest security patches and updates.

64
New cards

Use antivirus software

Installing antivirus software is an essential step in securing the operating system.

65
New cards

Use a firewal

A firewall is a security program that monitors and controls incoming and outgoing network traffic

66
New cards

Implement access controls

limit access to the operating system and data, ensuring that only authorized users can access sensitive information

67
New cards

Use strong passwords

is essential to securing the operating system.

68
New cards

Disable unnecessary services

Operating systems come with many services and features that are not needed for everyday use, reduces the attack surface of the system, making it more difficult for attackers to exploit vulnerabilities.

69
New cards

Enable encryption

: Encryption can be used to protect data from unauthorized access, operating systems that handle sensitive data should encrypt the data both at rest and in transit to prevent it from being accessed by unauthorized parties.

70
New cards

Securing the operating system

is essential to ensure the safety and integrity of the system

71
New cards

Educate and Train

Regularly train and educate employees or users about the dangers of phishing attacks and how to recognize them.

72
New cards

Email Filters

Use advanced email filtering solutions that can detect and filter out phishing emails based on certain patterns or suspicious behaviors.

73
New cards

Hover Over Links

Before clicking on any link, hover over it to see the actual URL. If the URL looks suspicious or doesn’t match the purported sender’s website, don’t click on it.

74
New cards

Use Two-Factor Authentication (2FA)

Even if attackers get user credentials, 2FA can prevent unauthorized access.

75
New cards

Regularly Update Software

Ensure that all systems and software, including email clients and web browsers, are regularly updated to benefit from the latest security patches.

76
New cards

Avoid Clicking on Suspicious Links

If an email seems unexpected or out of character, verify with the sender through a separate communication channel before clicking any links or downloading any attachments

77
New cards

Check for HTTPS

Ensure websites, especially those requiring personal information, use HTTPS. While not foolproof, HTTPS indicates that data is encrypted during transmission.

78
New cards

Install Anti-Phishing Toolbars

Some browsers can be equipped with toolbars that can quickly check the sites you are visiting against lists of known phishing sites.

79
New cards

Verify Email Senders

If you receive an unexpected email or an email from a source you do not recognize, verify the sender's identity before taking any action.

80
New cards

Regular Backups

Regularly back up data to ensure that, in the event of a ransomware attack (which can sometimes stem from phishing), critical data is not lost

81
New cards

Use Strong, Unique Passwords

Avoid using the same password across multiple sites and services. If one service is compromised, other accounts will remain safe.

82
New cards

Be Wary of Pop-Ups

Avoid entering any personal information into pop-ups. If you must log into an account, navigate to the website directly and log in there.

83
New cards

Regularly Monitor Accounts

Regularly monitor bank and other financial accounts for unauthorized activity. If you see anything unfamiliar, report it immediately.

84
New cards

Report Suspected Phishing

Report any suspected phishing emails to the appropriate authorities, which can help prevent others from becoming victim

85
New cards

Disgruntled Employee

An employee, unhappy with their treatment or the organization's decisions, decides to leak confidential company information to competitors or the public

86
New cards

Earthquakes

Sudden shaking or movement of the Earth's surface.

87
New cards

Hurricanes/Typhoons

Massive storm systems with strong winds, rain, and storm surges.

88
New cards

Floods

Overflow of water onto normally dry land.

89
New cards

Tornadoes

Violently rotating columns of air extending from thunderstorms to the ground

90
New cards

Wildfires

Uncontrolled fires spreading rapidly across vegetation