Cyber Security Fundamentals
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of a key logger?

  • To locate vulnerable wireless networks
  • ToDelete files and alter system configuration
  • To record all of your keystrokes and take periodic screenshots (correct)
  • To breach a system's security through social engineering

What is the primary goal of information security?

  • To protect against hardware failures
  • To ensure fast network speeds
  • To prevent unauthorized access to systems
  • To preserve confidentiality, integrity, and availability of information (correct)

What is social engineering?

  • A type of malicious software that lays dormant
  • A technique for breaching a system's security by exploiting human nature (correct)
  • A method of hacking that uses war-dialing
  • A way to locate vulnerable wireless networks

What is war-driving?

<p>A method of locating vulnerable wireless networks (D)</p> Signup and view all the answers

What is the term for software that has a malicious purpose?

<p>Malware (B)</p> Signup and view all the answers

What is the term for gaining unauthorized access to a system?

<p>Cracking (A)</p> Signup and view all the answers

What is a common method for spreading a virus?

<p>Using the victim's email account to spread the virus (D)</p> Signup and view all the answers

What is a logic bomb?

<p>Software that lays dormant until a specific condition is met (B)</p> Signup and view all the answers

What is the purpose of a Trojan horse?

<p>To secretly download a virus or malware onto a computer (B)</p> Signup and view all the answers

What is the purpose of spyware?

<p>To track Internet browsing history (D)</p> Signup and view all the answers

Study Notes

Cyber Security

  • Cyber security refers to the protection of information systems, data, and services from unauthorized access, harm, or misuse.
  • Protection includes harm caused intentionally by the system operator or accidentally due to failing to follow security procedures.

Information Security

  • Information security is the preservation of confidentiality, integrity, and availability of information.
  • Additional properties involved in information security include authenticity, accountability, non-repudiation, and reliability.

Malware

  • Malware is a generic term for software with a malicious purpose.
  • Types of malware include viruses, worms, adware, Trojan horses, and spyware.
  • Viruses are small programs that replicate and hide themselves inside other programs, usually without the user's knowledge.
  • Viruses can cause network slowdowns due to heavy network traffic caused by replication.
  • Trojan horses are electronic programs that appear to be benign but secretly download malware onto the computer.
  • Spyware is software that tracks a user's activities on their computer, including browsing history.
  • Logic bombs are software that lay dormant until a specific condition is met, then perform malicious acts.
  • Key loggers record all keystrokes and can take periodic screenshots of the computer.

Security Breaches

  • Security breaches include any attempt to gain unauthorized access to a system.
  • Examples of security breaches include cracking passwords, elevating privileges, and breaking into a server.
  • Cracking is the act of intruding into a system without permission, usually with malevolent intent.
  • Social engineering is a technique for breaching a system's security by exploiting human nature rather than technology.
  • War-dialing and war-driving are techniques used to gain entry to a system by calling phone numbers or locating vulnerable wireless networks.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Learn about the basics of cyber security, including the protection of information systems, data, and services from unauthorized access, harm, or misuse. Understand the importance of confidentiality, integrity, and availability of information.

More Like This

Use Quizgecko on...
Browser
Browser