Limiting Vulnerabilities Flashcards

(25 cards)

1
Q

What is physical security in IT?

A

Protecting physical devices and infrastructure from theft or damage.

Definition: Physical security includes locked server rooms, ID badges, cameras, and controlled access.
Boot Story: In an IT office, only authorized employees can access the server room using a keycard and badge system. Cameras monitor entries to prevent theft and tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

*

What are examples of physical security controls?

A

Locks, ID badges, security guards, cameras, and biometric access.

Definition: These measures prevent unauthorized access to restricted areas.
Boot Story: At a data center, employees swipe ID badges and scan fingerprints before entering server zones, ensuring sensitive hardware stays protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is multifactor authentication (MFA)?

A

A security method requiring two or more forms of verification to access an account.

Definition: MFA combines something you know (password), something you have (phone), and something you are (fingerprint).
Boot Story: An employee logs into the company portal using a password, then confirms a push notification on their phone — blocking anyone without both factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a strong password policy?

A

To protect accounts from unauthorized access and brute force attacks.

Definition: Strong passwords use a mix of letters, numbers, and symbols, and are changed regularly.
Boot Story: The IT team requires all employees to update passwords every 90 days and use passphrases, reducing the risk of credential leaks after a phishing incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is encryption?

A

The process of converting readable data into a coded format to protect it.

Definition: Encryption ensures that only users with the decryption key can read the information.
Boot Story: A company laptop is stolen, but because the hard drive is encrypted, the thief cannot access the financial reports stored on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric encryption?

A

Encryption that uses the same key for both encrypting and decrypting data.

Definition: Symmetric encryption is fast but less secure if the key is compromised.
Boot Story: A company encrypts archived payroll files with one key shared between HR and accounting. When the key is leaked, IT switches to asymmetric methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a VPN (Virtual Private Network)?

A

A secure tunnel between a user’s device and the internet or private network.

Definition: VPNs encrypt traffic, protecting data from interception.
Boot Story: A remote employee logs into the office network via VPN, safely accessing company files even while working from a coffee shop Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is asymmetric encryption?

A

Encryption that uses a public key to encrypt and a private key to decrypt data.

Definition: It’s more secure and widely used in emails and SSL/TLS connections.
Boot Story: A manager sends a confidential report using asymmetric encryption. The recipient’s private key ensures only they can unlock it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits of using a VPN?

A

Privacy, data encryption, and secure remote access.

Definition: VPNs shield sensitive information from hackers and eavesdroppers.
Boot Story: During a client call over public Wi-Fi, an IT consultant uses a VPN, ensuring that project details stay private despite the open network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is antimalware software?

A

Software that detects, prevents, and removes malicious software from systems.

Definition: Antimalware programs scan for threats like viruses, ransomware, and spyware.
Boot Story: After a user downloads a suspicious file, the company’s antimalware quarantines it immediately, preventing a ransomware infection from spreading across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malware?

A

Malicious software designed to damage or gain unauthorized access to systems.

Definition: Common types include viruses, worms, spyware, and ransomware.
Boot Story: An employee clicks a fake invoice link, unknowingly installing malware that encrypts files. IT isolates the machine and restores data from backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a virus?

A

A program that attaches to legitimate files and spreads when those files are shared.

Definition: Viruses often require user interaction to activate.
Boot Story: A USB drive infected with a virus was plugged into multiple workstations, spreading the malicious code through shared company documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a worm?

A

A self-replicating program that spreads through networks without human interaction.

Definition: Worms exploit system vulnerabilities to infect multiple machines.
Boot Story: After a patch was delayed, a worm quickly infected every unprotected PC on the office network, overwhelming bandwidth until IT intervened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ransomware?

A

Malware that encrypts files and demands payment to restore access.

Definition: It locks users out of their data until a ransom is paid, often in cryptocurrency.
Boot Story: The accounting department finds all files locked with a ransom note on screen. IT wipes infected systems and restores clean backups instead of paying the attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spyware?

A

Software that secretly monitors user activity and steals personal or business information.

Definition: Spyware runs silently, gathering data without user consent.
Boot Story: An employee’s laptop slows down, and IT discovers spyware logging keystrokes and sending confidential data to an unknown IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is adware?

A

Software that automatically displays or downloads unwanted advertisements.

Definition: Adware is often bundled with free programs and slows performance.
Boot Story: A user downloads a “free” photo editor, then starts seeing pop-up ads everywhere. IT removes the adware using a cleanup tool.

14
Q

What is the first step in malware removal?

A

Isolating the infected system from the network.

Definition: Disconnecting prevents malware from spreading to other systems.
Boot Story: After detecting ransomware on one workstation, the IT technician unplugs it from the network before running cleanup tools, containing the outbreak.

15
Q

What is the purpose of a system restore point?

A

To revert a computer’s settings and files to a previous stable state.

Definition: Restore points help recover from malware or faulty updates.
Boot Story: After a malware attack corrupts startup files, IT rolls back the system to a restore point created during last week’s maintenance, bringing it back online quickly.

16
Q

Why are regular backups important in cybersecurity?

A

They allow recovery of data after loss, corruption, or ransomware attacks.

Definition: Backups provide copies of files stored safely offsite or in the cloud.
Boot Story: When a server crashed during a power surge, IT restored operations within hours thanks to scheduled nightly backups.

17
Q

What is data wiping?

A

Securely erasing data so it cannot be recovered.

Definition: Data wiping overwrites existing information to prevent retrieval.
Boot Story: Before recycling old laptops, IT uses a data wiping tool to permanently erase hard drives, ensuring no customer data can be recovered later.

18
Q

What is patch management?

A

Regularly updating software to fix vulnerabilities and improve security.

Definition: Patch management prevents known exploits from being used by attackers.
Boot Story: A recent security bulletin warned of a browser exploit, and IT immediately rolled out a patch to all systems before attackers could take advantage.

19
Q

What is non-repudiation?

A

Ensuring that actions or transactions cannot be denied later.

Definition: Non-repudiation provides proof of identity and integrity for data exchanges.
Boot Story: In an e-signature platform, each signature is timestamped and verified, so users can’t deny approving a contract later.

20
Q

What is authentication?

A

The process of verifying a user’s identity before granting access.

Definition: Authentication confirms that users are who they claim to be.
Boot Story: Before accessing payroll systems, employees enter their credentials and verify through a secure code on their phones to confirm identity.

21
Q

What is authorization?

A

Granting a user specific permissions after authentication.

Definition: Authorization determines what actions or data a user can access.
Boot Story: After logging in, a manager can view all team schedules, but regular staff can only see their own — that’s authorization control in action.

21
What is least privilege?
Giving users the minimum permissions necessary to do their job. ## Footnote Definition: This reduces security risks from misuse or compromise of accounts. Boot Story: IT assigns the marketing intern read-only access to reports, preventing accidental edits or data leaks from unnecessary privileges.