Cyber security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

What does each letter in the CIA Triad stand for?

Confidentiality, Integrity, Availability.

2
New cards

What are the three stages of data?

Data in Transit, Data at Rest, Data in Use.

3
New cards

What is the formula for the model of cybersecurity?

Protection = Prevention + (Detection + Response).

4
New cards

What are the three types of authentication factors?

Something you know, Something you have, Something you are.

5
New cards

What is a Brute Force Attack?

An attack where multiple passwords are tried for one account.

6
New cards

What is a Hash Collision?

A situation where two different inputs produce the same hash output.

7
New cards

Define Social Engineering.

To get an authorized user to give information or access to an unauthorized person.

8
New cards

What is Phishing?

The use of bogus emails and websites to trick individuals into providing confidential or personal information.

9
New cards

What is pointed out by the Least Privilege Principle in cybersecurity?

Provide each user with the minimum system access needed to perform their tasks.

10
New cards

What is the 3-2-1 rule of backups?

3 copies of data: 2 copies stored on different devices, and 1 copy offsite or in the cloud.

11
New cards

What is the main goal of password hashing?

To securely store passwords in a way that makes them hard to retrieve in their original form.

12
New cards

What does OSINT stand for?

Open Source Intelligence.

13
New cards

What is the difference between a backup and syncing with cloud services like Google Drive?

A backup is a static snapshot of data; syncing means changes in one location reflect in another.

14
New cards

What is Cryptanalysis?

Attempting to break a cryptographic system and return the encrypted message to plaintext.

15
New cards

What is an example of a password attack technique?

Password Spraying, Credential Surfing, or Brute Force Attack.

16
New cards

What is a Token in authentication methods?

A physical device used to authenticate a user's identity.

17
New cards

What are the main tools provided by Windows Security Center?

Firewall & Network Protection, Virus and Threat Protection, User Account Control, App and Browser Control.

18
New cards

What does the term "Salt" refer to in password security?

Random data added to passwords before hashing to ensure unique hash outputs.

19
New cards

What is meant by System Hardening?

The process of limiting potential weaknesses that make systems vulnerable to cyber attacks.

20
New cards

What is a common vulnerability scanner?

An automated tool that connects to a system and identifies known vulnerabilities.