Cybersecurity Concepts Quiz
21 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does copyright specifically grant to creators?

  • The right to prevent others from using their ideas.
  • Ownership over all intangible assets related to their work.
  • Legal rights to anything they create that embodies an idea. (correct)
  • The right to prevent others from making or selling their inventions.
  • Which type of security policy is focused on how data should be classified?

  • Acceptable Use Policy
  • Data Classification Policy (correct)
  • Access Control Policy
  • Incident Response Policy
  • Which of the following represents an example of a patent?

  • A unique chemical formula.
  • A secret recipe for a soft drink.
  • A business strategy for a startup.
  • A new type of plant developed through breeding. (correct)
  • What is an act that constitutes patent infringement?

    <p>Selling a patented invention without consent from the patent holder.</p> Signup and view all the answers

    Which right is NOT associated with the Data Privacy Act of 2012?

    <p>Right to prevent others from using your identity.</p> Signup and view all the answers

    What is the primary goal of proactive intrusion detection?

    <p>To prevent unauthorized access through physical measures</p> Signup and view all the answers

    Which feature enhances the transition to a new physical security system?

    <p>Easy scalability and quick setup</p> Signup and view all the answers

    What does operational security primarily focus on?

    <p>Viewing operations from the adversary's perspective</p> Signup and view all the answers

    How does the Data Privacy Act of 2012 protect individuals?

    <p>By regulating the processing of personal data</p> Signup and view all the answers

    Which of the following represents a risk brought by data breaches?

    <p>Identity theft or fraud</p> Signup and view all the answers

    What is an example of tracking technology?

    <p>Cookies and mobile apps</p> Signup and view all the answers

    What does criminal defamation laws frequently lead to?

    <p>Abuse and suppression of public interest cases</p> Signup and view all the answers

    What is informal censorship intended to prevent?

    <p>Critical publications or broadcasts</p> Signup and view all the answers

    What type of exploit has not been disclosed to the public?

    <p>Zero-day exploits</p> Signup and view all the answers

    Which of the following best describes a Denial of Service (DoS) attack?

    <p>An attack that floods a system with data to cause disruption</p> Signup and view all the answers

    What is a primary goal of Malware Forensics?

    <p>Finding and tracking attacking malware</p> Signup and view all the answers

    Which type of forensics involves investigating data from physical storage devices?

    <p>Disk Forensics</p> Signup and view all the answers

    What does identity theft primarily involve?

    <p>Accessing personal information for unauthorized use</p> Signup and view all the answers

    Which of the following measures is considered an aspect of physical security?

    <p>Physical access restrictions to buildings</p> Signup and view all the answers

    What is the primary feature of Cross-Site Request Forgery (CSRF)?

    <p>Executing unwanted actions on a web application</p> Signup and view all the answers

    What is the main purpose of network forensics?

    <p>To investigate network traffic for malicious activity</p> Signup and view all the answers

    Study Notes

    Security Incident

    • A security event damaging network resources or data, part of an attack or security threat.

    Exploit

    • Code, software, or method used by attackers to exploit vulnerabilities in applications, systems, or networks.
    • Known exploits are vulnerabilities already discovered, documented, and made public.
    • Unknown exploits (zero-day exploits) are vulnerabilities not yet known or disclosed.

    Denial of Service (DoS) Attack

    • Cyber attack flooding a computer or website with data, overloading the system to prevent proper functioning.

    Malware

    • Harmful software (spyware, viruses, ransomware, worms) accessing system data.

    Identity Theft

    • Criminal accessing a user's personal information for personal gain.

    Cryptojacking

    • Cybercriminals using a victim's computer resources to mine cryptocurrencies without their knowledge.

    Cross-Site Request Forgery (CSRF)

    • Attack forcing an end user to execute unwanted actions on a web application while authenticated.

    Disk Forensics

    • Process of recovering data from physical storage devices, finding deleted files, and hidden partitions.

    Network Forensics

    • Investigating network traffic to find evidence of security incidents, unauthorized access, or malicious activity.

    Database Forensics

    • Collecting information contained in a database, including data and metadata.

    Mobile Forensics

    • Procedure of extracting, investigating and recovering data from mobile devices.

    Malware Forensics

    • Identifying, examining, and tracking malicious software.

    Physical Security

    • Measures protecting buildings and equipment from unauthorized access.
    • Preventing unauthorized entry and ensuring authorized access.

    Proactive Intrusion Detection

    • First line of defense for a building, physical security crucial in preventing intrusions.

    Scalable Physical Security Implementation

    • Easy-to-install, quick-to-set-up solution for physical security, ensuring seamless transition to a new system.

    Seamless System Integrations

    • Physical security systems integrating with other software, applications, and systems through cloud operation.

    Audit Trails and Analytics

    • Easily detecting system weaknesses allowing implementing new physical security plans.

    Operational Security

    • Risk management process viewing operations from an adversary's perspective to protect sensitive information.

    Information Privacy

    • Right of individuals to control how their personal data is collected, stored, and shared.

    Data Ownership

    • Individuals own their personal data and control its usage.

    Data Collection Practices

    • Companies and organizations collecting data through various means (online forms, cookies, apps).
    • Organizations obtaining clear, informed consent before collecting individual data.

    Tracking Technologies

    • Tools (cookies, mobile apps) tracking user activity.

    Data Breaches

    • Unauthorized access to sensitive data leading to identity theft or fraud.

    Social Media Privacy

    • Over-sharing and lack of privacy controls on social media exposing personal information.

    Data Privacy Act of 2012 (RA 10173)

    • Protecting individual privacy by regulating personal data processing.

    Freedom of Expression

    • Ability to express beliefs, thoughts, ideas, and emotions without government censorship.

    Criminal Defamation Laws

    • Frequently abused laws used in cases not involving public interest, used as a first, not last resort.

    Media Attacks and Harassment

    • Harassment of journalists and media workers posing a significant threat to independent journalism.

    Informal Censorship

    • Preventing or punishing publication/broadcast of critical/sensitive material.

    Hate Speech

    • Insidious and pervasive ways of undermining rights enjoyment.

    Gender Equity Media

    • Ensuring proper coverage of women's issues and perspectives.

    Intellectual Property (IP)

    • Non-physical assets, owned by individuals or companies
    • Intellectual property examples: Copyright, Patents
    • Legal rights over creative works.

    Patents

    • Legal rights over inventions.

    Patent Infringement

    • Unlawful use of a patented invention without permission.

    Trade Secret

    • Confidential business information granting a competitive advantage.

    Security Policies

    • Acceptable Use Policy
    • Data Classification Policy
    • Incident Response Policy
    • Access Control Policy

    Data Privacy Act of 2012 Provisions

    • Transparency in data collection
    • Secure storage of personal information
    • Individuals' rights to access and correct their data

    Freedom of Speech: Key Issues

    • Key terms related to freedom of speech (specific issues related to freedom of speech may vary)

    IP Key Terms

    • Confidentiality
    • Copyright
    • Indigenous rights
    • Patents
    • Registered designs
    • Trade marks
    • Trade secrets

    Examples of Trade Secrets

    • Formulas
    • Patterns
    • Methods, techniques, and processes

    Examples of Patents

    • Utility patents
    • Design patents
    • Plant patents

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Finals Reviewer - DCIT65 PDF

    Description

    Test your knowledge on various cybersecurity concepts such as security incidents, malware, and denial of service attacks. This quiz covers critical topics including exploit types, identity theft, and cryptojacking. Perfect for anyone looking to improve their understanding of cyber threats and defenses.

    More Like This

    Cybersecurity Concepts and Practices Quiz
    35 questions
    Cybersecurity Chapter 9 Quiz
    15 questions

    Cybersecurity Chapter 9 Quiz

    ReputableTangent4657 avatar
    ReputableTangent4657
    NIST 800-83 on Malware Definition
    5 questions
    Use Quizgecko on...
    Browser
    Browser