Cyber Security Fundamentals

RevolutionarySilicon avatar
RevolutionarySilicon
·
·
Download

Start Quiz

Study Flashcards

10 Questions

What is the primary function of a key logger?

To record all of your keystrokes and take periodic screenshots

What is the primary goal of information security?

To preserve confidentiality, integrity, and availability of information

What is social engineering?

A technique for breaching a system's security by exploiting human nature

What is war-driving?

A method of locating vulnerable wireless networks

What is the term for software that has a malicious purpose?

Malware

What is the term for gaining unauthorized access to a system?

Cracking

What is a common method for spreading a virus?

Using the victim's email account to spread the virus

What is a logic bomb?

Software that lays dormant until a specific condition is met

What is the purpose of a Trojan horse?

To secretly download a virus or malware onto a computer

What is the purpose of spyware?

To track Internet browsing history

Study Notes

Cyber Security

  • Cyber security refers to the protection of information systems, data, and services from unauthorized access, harm, or misuse.
  • Protection includes harm caused intentionally by the system operator or accidentally due to failing to follow security procedures.

Information Security

  • Information security is the preservation of confidentiality, integrity, and availability of information.
  • Additional properties involved in information security include authenticity, accountability, non-repudiation, and reliability.

Malware

  • Malware is a generic term for software with a malicious purpose.
  • Types of malware include viruses, worms, adware, Trojan horses, and spyware.
  • Viruses are small programs that replicate and hide themselves inside other programs, usually without the user's knowledge.
  • Viruses can cause network slowdowns due to heavy network traffic caused by replication.
  • Trojan horses are electronic programs that appear to be benign but secretly download malware onto the computer.
  • Spyware is software that tracks a user's activities on their computer, including browsing history.
  • Logic bombs are software that lay dormant until a specific condition is met, then perform malicious acts.
  • Key loggers record all keystrokes and can take periodic screenshots of the computer.

Security Breaches

  • Security breaches include any attempt to gain unauthorized access to a system.
  • Examples of security breaches include cracking passwords, elevating privileges, and breaking into a server.
  • Cracking is the act of intruding into a system without permission, usually with malevolent intent.
  • Social engineering is a technique for breaching a system's security by exploiting human nature rather than technology.
  • War-dialing and war-driving are techniques used to gain entry to a system by calling phone numbers or locating vulnerable wireless networks.

Learn about the basics of cyber security, including the protection of information systems, data, and services from unauthorized access, harm, or misuse. Understand the importance of confidentiality, integrity, and availability of information.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Information Security Fundamentals
10 questions
Information Security Terminologies
40 questions
Use Quizgecko on...
Browser
Browser