Flashcards on Cyber Security

Click on the flashcard to see the answer


What is cyber security?

Cyber security refers to the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, and damage.

What are the common types of cyber threats?

Common types of cyber threats include malware, phishing, ransomware, social engineering, and denial of service (DoS) attacks.

What is the role of encryption in cyber security?

Encryption plays a crucial role in cyber security by encoding information to prevent unauthorized access or data breaches.

What are some best practices for password security?

Some best practices for password security include using unique passwords for each account, using a combination of letters, numbers, and symbols, and regularly updating passwords.

What is a firewall and how does it protect against cyber threats?

A firewall is a network security device that monitors and filters incoming and outgoing network traffic to prevent unauthorized access and protect against cyber threats.

What is two-factor authentication and why is it important for cyber security?

Two-factor authentication is a security measure that requires users to provide two different forms of identification to access an account or system, providing an additional layer of protection against unauthorized access.

What is social engineering?

Social engineering is a psychological manipulation technique used by cybercriminals to deceive individuals and gain unauthorized access to sensitive information or systems.

What is the difference between antivirus software and anti-malware software?

Antivirus software primarily detects and protects against computer viruses, while anti-malware software detects and protects against various types of malicious software, including viruses, spyware, adware, and ransomware.

What are the steps to prevent phishing attacks?

Steps to prevent phishing attacks include being cautious of suspicious emails or messages, not clicking on unknown links or attachments, and verifying the authenticity of websites before providing personal information.

What is a vulnerability assessment?

A vulnerability assessment is the process of identifying and evaluating potential vulnerabilities in a system or network to determine the level of risk they pose and implement appropriate security measures.

What are some common signs of a cyber attack?

Common signs of a cyber attack include sudden system slowdowns, unusual network traffic, unauthorized access to accounts or systems, and data breaches.

What is the role of cybersecurity awareness training?

Cybersecurity awareness training educates individuals about the importance of cyber security, common threats, and best practices to prevent cyber attacks, enhancing overall security posture.

What is the dark web and why is it a concern for cyber security?

The dark web refers to hidden websites and online platforms that require special software or authorization to access. It is a concern for cyber security as it facilitates illegal activities, hacking tools, and the sale of stolen data.

What is the impact of cyber attacks on businesses?

Cyber attacks can have a significant impact on businesses, including financial losses, reputational damage, disruption of operations, compromised customer data, and legal consequences.

What is a DDoS attack?

A DDoS (Distributed Denial of Service) attack is a type of cyber attack in which multiple compromised systems flood a target server, network, or website with excessive traffic, causing it to become unavailable to users.

What are the ethical considerations in cyber security?

Ethical considerations in cyber security include respecting privacy, obtaining proper consent, adhering to industry standards and regulations, and responsibly disclosing vulnerabilities or security flaws.

What is cyber security?

Cyber security refers to the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from digital attacks, theft, and damage.

What are the common types of cyber threats?

Common types of cyber threats include malware, phishing, ransomware, social engineering, and denial of service (DoS) attacks.

What is the role of encryption in cyber security?

Encryption plays a crucial role in cyber security by encoding information to prevent unauthorized access or data breaches.

What are some best practices for password security?

Some best practices for password security include using unique passwords for each account, using a combination of letters, numbers, and symbols, and regularly updating passwords.

What is a firewall and how does it protect against cyber threats?

A firewall is a network security device that monitors and filters incoming and outgoing network traffic to prevent unauthorized access and protect against cyber threats.

What is two-factor authentication and why is it important for cyber security?

Two-factor authentication is a security measure that requires users to provide two different forms of identification to access an account or system, providing an additional layer of protection against unauthorized access.

What is social engineering?

Social engineering is a psychological manipulation technique used by cybercriminals to deceive individuals and gain unauthorized access to sensitive information or systems.

What is the difference between antivirus software and anti-malware software?

Antivirus software primarily detects and protects against computer viruses, while anti-malware software detects and protects against various types of malicious software, including viruses, spyware, adware, and ransomware.

What are the steps to prevent phishing attacks?

Steps to prevent phishing attacks include being cautious of suspicious emails or messages, not clicking on unknown links or attachments, and verifying the authenticity of websites before providing personal information.

What is a vulnerability assessment?

A vulnerability assessment is the process of identifying and evaluating potential vulnerabilities in a system or network to determine the level of risk they pose and implement appropriate security measures.

What are some common signs of a cyber attack?

Common signs of a cyber attack include sudden system slowdowns, unusual network traffic, unauthorized access to accounts or systems, and data breaches.

What is the role of cybersecurity awareness training?

Cybersecurity awareness training educates individuals about the importance of cyber security, common threats, and best practices to prevent cyber attacks, enhancing overall security posture.

What is the dark web and why is it a concern for cyber security?

The dark web refers to hidden websites and online platforms that require special software or authorization to access. It is a concern for cyber security as it facilitates illegal activities, hacking tools, and the sale of stolen data.

What is the impact of cyber attacks on businesses?

Cyber attacks can have a significant impact on businesses, including financial losses, reputational damage, disruption of operations, compromised customer data, and legal consequences.

What is a DDoS attack?

A DDoS (Distributed Denial of Service) attack is a type of cyber attack in which multiple compromised systems flood a target server, network, or website with excessive traffic, causing it to become unavailable to users.

What are the ethical considerations in cyber security?

Ethical considerations in cyber security include respecting privacy, obtaining proper consent, adhering to industry standards and regulations, and responsibly disclosing vulnerabilities or security flaws.

Share


Login to Save


Share



Login to Save


Explore Other Decks


Made for Grade 7

Information Technology: Objects in Electronic Spreadsheets


View Deck
Made for Grade 8

The French Revolution


View Deck
Made for Grade 8

Thinking Outside the Box


View Deck

Explore More