Define confidentiality in security.
The principle of ensuring that information is not disclosed to unauthorized individuals.
What does CIA stand for in cybersecurity?
Confidentiality, Integrity, and Availability.
True or false: Integrity ensures data remains accurate and unaltered.
TRUE
Integrity is crucial for maintaining trust in data.
Fill in the blank: Availability ensures that information is ______ when needed.
accessible
What is a firewall?
A network security device that monitors and controls incoming and outgoing traffic.
Define phishing.
A cyber attack that attempts to trick individuals into providing sensitive information.
What is the purpose of encryption?
To protect data by converting it into a coded format that is unreadable without a key.
True or false: Malware includes viruses, worms, and Trojans.
TRUE
Malware is designed to harm or exploit any programmable device.
Fill in the blank: Social engineering exploits ______ to manipulate individuals.
human psychology
What is a DDoS attack?
A Distributed Denial of Service attack that overwhelms a target with traffic.
Define vulnerability.
A weakness in a system that can be exploited by threats to gain unauthorized access.
What is the role of antivirus software?
To detect, prevent, and remove malware from computers and networks.
True or false: Two-factor authentication increases security by requiring two forms of verification.
TRUE
This method significantly reduces the risk of unauthorized access.
Fill in the blank: Risk management involves identifying, assessing, and ______ risks.
mitigating
What is a security policy?
A formal document that outlines an organization’s security expectations and procedures.
Define penetration testing.
A simulated cyber attack to identify vulnerabilities in a system.
What does SIEM stand for?
Security Information and Event Management.
True or false: SSL is used to secure communications over a computer network.
TRUE
SSL encrypts data between a web server and a browser.
Fill in the blank: Access control determines who can ______ resources.
use or modify
What is a security breach?
An incident where unauthorized access to data or systems occurs.
Define malware.
Software designed to disrupt, damage, or gain unauthorized access to systems.
What is data loss prevention?
Strategies and tools to ensure sensitive data is not lost or misused.
True or false: Cloud security is only the responsibility of the service provider.
FALSE
Users also share responsibility for securing their data in the cloud.
Fill in the blank: Incident response is the approach to managing ______ events.
security incidents