Chapter 5 Flashcards

(16 cards)

1
Q

What is the CIA Triad?

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the C in CIA stand for and what does it do?

A

Confidentiality— keeps data private. Breaches occur when information is exposed to those who should not have access, whether through hacking, insider threats, or accidental disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the I in CIA stand for and what does it do?

A

Integrity—ensures that information has not been altered in an unauthorized way. Data corruption, unauthorized modification or tampering all threaten integrity which can lead to bad decisions, legal problems and financial loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the A in CIA stand for and what does it do?

A

Availability means that systems, networks, and data must be up and running when required. Disruptions, whether accidental (hardware failure) or intentional (e.g. denial-of-service attacks)-can harm operations if availability is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Network Sniffing?

A

Intercepting data packets as they travel across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the different forms of identity theft?

A

Financial, medical, criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who is particularly vulnerable to Social Engineering?

A

New employees and users unfamiliar with procedures are especially vulnerable. Social engineering relies on trust, urgency, and authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is considered a security breach?

A

An incident resulting in access to unauthorized data, applications, services or networks by bypassing underlying security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false: Identity theft is-fraudulent acquisition and use of a person’s private identifying information.

A

True. There are at least three forms of identity theft: financial, medical and criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some examples of financial identity theft?

A

Stealing a persons bank account or credit card information to apply for credit or take out loans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some examples of medical identity theft?

A

Using personal information to obtain medical services, prescriptions, or submit fraudulent insurance claims, which can corrupt medical records. Also, buying prescription drugs and submitting fake billing to an insurance company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Ransomware?

A

A type of malicious software designed to block off access to a computer system until a sum of money is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: Hacktivists target systems to promote political agendas. Cyberterrorists attack infrastructure to cause widespread harm.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Extra credit: who are white-hat hackers?

A

Hackers employed by organizations to find and fix vulnerabilities before they are exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some examples of criminal identity theft?

A

Providing identifying information to law enforcement in a way that results in a false criminal record or legal consequences for the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do Password Managers do?

A

Password Managers securely generate, store, and autofill string unique passwords for each site. Instead of remembering dozens of passwords, users unlock the manager with a single string master password or biometric authentication. The manager then encrypts stored credentials and automatically inserts the correct password ink on the legitimate website, reducing both guessing and phishing risk.