Security focuses on
- Speed
- Safety
- Graphic
Safety
Purpose of Cybersecurity
- Delete files
- Protect information
Protect information
Which is the most at risk online
- Banks
- GOvernmnet
- All network users
All network user
Firewall functions
- Install software
- FIlter traffic
- Print data
- play videos
Filter traffic
IDS helps to
- Monitor threats
- Delete OS
Monitor threatsD
Dos attacks means
- Faster system
- Server overload
- FIle encryption
Server overload
SYN flooding affects
- TCP
- Keyboard
- Mouse
TCP
SMURF attack uses
- email
- broadcast ping
broadcast ping
DDoS uses
- One computer
- Many computer
- Router
- Printer
Many Computer
Packet sniffing is
- Traffic monitoring
- File Deletion
- Email Sending
Traffic monitoring
Public Wi-Fi risk
- Slow internet
- Data interception
- Broken cble
- Virus only
Data interception
Secure remote access protocol
- HTTP
- SSH
- FTP
- SMTP
SSH
Secure browsing uses
- HTTP
- HTTPS
- FTP
- Telnet
HTTPS
TCP hijacking involves
- Taking over connection
- Breaking hardware
- Deleting RAM
- Stopping monitor
Taking over connection
Dictionay attack is
- Guess password
- Print words
- Delete files
Guess password
CIA Triad includes
- Security Layr
- Confidentiality
- System
- Internet authority
Confidentiality
Confidentiality ensures:
- Restricted access
- Open Access
- Data deletion
- Sharing
Restricted access
Integrity ensures:
-Accurate data
- Fast system
- large storage
Accurate data
Availability ensures:
- Systemuptime
- Shutdown
- Formatting
System uptime
Authentication is:
- Identity verification
- Access control
Identity verification
Authorization is:
-permission granting
- identity check
Permission granting
MFA require:
- One factor
- Multiple factors
- No login
Multiple factors
Security patch:
- Fixes bugs
- Addds games
- Deletes OS
- Increases storage
Fixes bugs
Content Security Policy prevents:
- XSS attacks
- Printer issues
- Keyboard issues
XSS attacks