What does the “C” in the CIA Triad stand for?
Confidentiality
What is phishing?
A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
What is a vulnerability in a system?
A weakness that can be exploited by a threat.
What is encryption used for?
Protecting data by transforming it into a secure format that can only be read with a key.
What is the first step in responding to a cyber security incident?
Identifying and containing the threat.
Name the three components of the CIA Triad.
Confidentiality, Integrity, Availability
What type of attack floods a server to make it unavailable?
Denial of Service (DoS) attack.
What is insider threat?
A cyber security risk from someone within an organization, like a disgruntled employee.
What is patch management?
Applying updates to software to fix vulnerabilities.
Who is responsible for reporting a cyber security incident in an organization?
The incident response team or designated personnel.
What is the purpose of cyber security?
To protect information, systems, and networks from cyber threats.
What does malware do?
Malicious software designed to harm or exploit a system.
List three motivations for cyber attackers.
Espionage, fraud, publicity.
What is a firewall?
Software or hardware that blocks unauthorized access to a network.
What is the role of a cyber security incident report?
Documenting the details of an incident to prevent future occurrences.
What does “integrity” mean in data security?
Ensuring data is accurate and has not been tampered with.
What is social engineering in cyber attacks?
A method of tricking individuals into giving out confidential information.
What does accidental cyber threat refer to?
A threat caused by mistakes, such as clicking on a phishing link.
Name one type of testing measure used to assess cyber vulnerabilities.
Penetration testing.
What does CSIRT stand for?
Computer Security Incident Response Team.
Give an example of personal data that should be protected under cyber security measures.
Health records, financial data, or national insurance details.
What is a botnet?
A network of computers infected with malware and controlled remotely.
How does organized crime use cyber attacks?
By performing illegal activities like hacking or fraud, sometimes through sophisticated networks.
What is a honeypot in cyber security?
A decoy system used to attract attackers and study their methods.
What is the purpose of vulnerability scanning?
To identify and fix potential security weaknesses before they are exploited.