The CIA Triad
What is confidentiality, integrity, and availability?
A point at which there is potential for a security breach
What is a vulnerability?
Malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action
What is ransomware
An unsophisticated person who attacks using off-the shelf tools
What is a script kiddie?
A one-way transformation of data into a fixed-length value.
What is hashing?
Ensuring that users cannot deny knowledge of sending a message or performing some online activity at some point later in time.
What is non repuditation?
Some danger that can exploit a vulnerability
What is a threat?
Records the activities of the user, such as the passwords they type into the computer and transmits this information to the person who wrote the malware
What is spyware (or What is a key logger)?
A group of hackers funded directly or indirectly by a government.
What are state-sponsored hackers?
A reversible (2-way) transformation between content and ciphertext.
What is encryption/decryption?
Identify, Protect, Detect, Respond, Recover
What are the core functions of the NIST Cybersecurity Framework (v1.x)?
Someone who commits crimes over the internet
What is a cybercriminal?
These are created using malware that allows an attacker to control a group of computers and use them for cyber crimes.
What are botnets?
A person who is employed to find vulnerabilities before anyone exploits them so that the organization can protect against them.
What is a white-hat hacker?
A value sent alongside content which allows the receiver to test the integrity of the content
What is a checksum?
Verifying the identity of a user
What is authentication?
Emails that are fake and asking you to click on a link to give you malware
What is phishing?
Malware that can spread by itself
What is a worm?
A person who hacks in order to pursue an agenda or raise awareness of a topic.
What is a hacktivist?
A value stored alongside password hashes to increase security
What is a salt?
18
What is the number of CIS controls?
Action you take to protect your information against threats and vulnerabilities.
What is a countermeasure?
A polymorphic virus
What is a kind of virus that changes itself in order to evade detection?
A person who hacks to find vulnerabilities without permission but discloses information to organizations and is sometimes paid a bounty.
What is a grey-hat hacker?
Precomputed lists of hashes for common passwords
What is a rainbow table?