Cyber Security Fundamentals
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of a key logger?

  • To locate vulnerable wireless networks
  • ToDelete files and alter system configuration
  • To record all of your keystrokes and take periodic screenshots (correct)
  • To breach a system's security through social engineering
  • What is the primary goal of information security?

  • To protect against hardware failures
  • To ensure fast network speeds
  • To prevent unauthorized access to systems
  • To preserve confidentiality, integrity, and availability of information (correct)
  • What is social engineering?

  • A type of malicious software that lays dormant
  • A technique for breaching a system's security by exploiting human nature (correct)
  • A method of hacking that uses war-dialing
  • A way to locate vulnerable wireless networks
  • What is war-driving?

    <p>A method of locating vulnerable wireless networks</p> Signup and view all the answers

    What is the term for software that has a malicious purpose?

    <p>Malware</p> Signup and view all the answers

    What is the term for gaining unauthorized access to a system?

    <p>Cracking</p> Signup and view all the answers

    What is a common method for spreading a virus?

    <p>Using the victim's email account to spread the virus</p> Signup and view all the answers

    What is a logic bomb?

    <p>Software that lays dormant until a specific condition is met</p> Signup and view all the answers

    What is the purpose of a Trojan horse?

    <p>To secretly download a virus or malware onto a computer</p> Signup and view all the answers

    What is the purpose of spyware?

    <p>To track Internet browsing history</p> Signup and view all the answers

    Study Notes

    Cyber Security

    • Cyber security refers to the protection of information systems, data, and services from unauthorized access, harm, or misuse.
    • Protection includes harm caused intentionally by the system operator or accidentally due to failing to follow security procedures.

    Information Security

    • Information security is the preservation of confidentiality, integrity, and availability of information.
    • Additional properties involved in information security include authenticity, accountability, non-repudiation, and reliability.

    Malware

    • Malware is a generic term for software with a malicious purpose.
    • Types of malware include viruses, worms, adware, Trojan horses, and spyware.
    • Viruses are small programs that replicate and hide themselves inside other programs, usually without the user's knowledge.
    • Viruses can cause network slowdowns due to heavy network traffic caused by replication.
    • Trojan horses are electronic programs that appear to be benign but secretly download malware onto the computer.
    • Spyware is software that tracks a user's activities on their computer, including browsing history.
    • Logic bombs are software that lay dormant until a specific condition is met, then perform malicious acts.
    • Key loggers record all keystrokes and can take periodic screenshots of the computer.

    Security Breaches

    • Security breaches include any attempt to gain unauthorized access to a system.
    • Examples of security breaches include cracking passwords, elevating privileges, and breaking into a server.
    • Cracking is the act of intruding into a system without permission, usually with malevolent intent.
    • Social engineering is a technique for breaching a system's security by exploiting human nature rather than technology.
    • War-dialing and war-driving are techniques used to gain entry to a system by calling phone numbers or locating vulnerable wireless networks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Learn about the basics of cyber security, including the protection of information systems, data, and services from unauthorized access, harm, or misuse. Understand the importance of confidentiality, integrity, and availability of information.

    More Like This

    What is a Cyber Attack?
    12 questions
    Computer Security Chapter 12
    7 questions
    Use Quizgecko on...
    Browser
    Browser