Foundations of cybersecurity

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Business email compromise (BEC) (phishing ex.)

An attack in which a threat actor impersonates a known source to obtain a financial advantage

Physical social engineering (social eng. ex.)

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

USB baiting (social eng. ex.)

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network

Security posture

An organization's ability to manage its defense of critical assets and data and react to change

Fill in the blank: Performing _____ enables security professionals to review an organization's security records, activities, and related documents.

security audits (official inspection)

Which proficiencies are transferable skills, likely to be applicable in almost any field? Select three answers.

written & verbal communication problem solving analysis

whaling (phishing ex.)

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data

ransomware (malware ex.)

A malicious attack during which threat actors encrypt an organization's data and demand payment to restore access

spear phishing (phishing ex.)

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source

Virus (malware ex.)

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

Social engineering

A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data

Malware

A software designed to harm devices or networks

Social media phishing (social eng. ex.)

An attack in which a threat actor collects detailed information about their target on social media sites before initiating an attack

Watering hole attack (social eng. ex.)

An attack in which a threat actor compromises a website frequently visited by a specific group of users

spyware (malware ex.)

Malicious software installed on a user's computer without their permission, which is used to spy on and steal user data

worm (malware ex.)

Malware that self-replicates, spreading across the network and infecting computers

What occurs during a security audit?

Review of an organization's security records, activities, and other related documents

vishing

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

Network security

The practice of keeping an organization's network infrastructure secure from unauthorized

phishing

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

smishing

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

physical attack

a security incident that affects not only digital but also physical environments where the incident is deployed. Some forms of physical attacks are: Malicious USB cable Malicious flash drive Card cloning and skimming Physical attacks fall under the asset security domain.

Security frameworks

are guidelines used for building plans to help mitigate risks and threats to data and privacy

Security controls

are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture

A security professional is asked to destroy and dispose of old hard drives that include confidential customer information. Which security domain is this task related to?

asset security

Fill in the blank: A computer virus is malicious _____ that interferes with computer operations and causes damage.

code

Fill in the blank: Cybersecurity is the practice of ensuring _____ by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

confidentiality, integrity, and availability of information

Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or unauthorized access.

criminal exploitation

Fill in the blank: _____ identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.

digital forensic investigators

Programming

is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include: Automation of repetitive tasks (e.g., searching a list of malicious domains) Reviewing web traffic Alerting suspicious activity

Adversarial artificial intelligence

is a technique that manipulates artificial intelligence and machine learning technology to conduct attacks more efficiently. Adversarial artificial intelligence falls under both the communication and network security and the identity and access management domains.

Security posture

is an organization's ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization

Compliance

is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches

What is one way that the Morris worm helped shape the security industry?

it led to development of computer response teams

What are the primary responsibilities of an entry-level security analyst? Select three answers.

monitor systems search for weaknesses protect information

Which proficiencies are technical skills that are needed to become an entry-level security analyst? Select two answers.

programming data analysis

In what ways do security teams bring value to an organization? Select two answers

protection against external & internal threats achieving regulatory compliance

Your supervisor asks you to audit user permissions for payroll data to ensure no unauthorized employees have access to it. Which security domain is this audit related to?

security assessment and testing

You are asked to investigate an alert related to an unknown device that is connected to the company's internal network. After you complete your investigation, you follow company policies and procedures to implement preventative measures that will stop the potential threat posed by the device. Which security domain is this scenario related to?

security operations


Set pelajaran terkait

Lecture: Viral Structure and Classification, Prions

View Set

Chest tubes and water seal drainage

View Set

Week 3: Musculoskeletal and Neuro

View Set

Macro Final Exam Review Questions

View Set

Module 1: Lesson 2. Characteristics of Earth that Sustain Life

View Set

EPPP Ethics Domain Missed Questions

View Set

Chapter 8: Accounting for receivables

View Set

Translating Algebraic Expressions

View Set

8.8 Bioaccumulation and Biomagnification

View Set