3.6.2 Methods to detect and prevent cyber security threats

Cards (76)

  • Match the cybersecurity threat with its description:
    Malware ↔️ Malicious software designed to disrupt or damage systems
    Phishing ↔️ Attempts to trick users into revealing information
    Denial-of-Service (DoS) ↔️ Overwhelms system resources to make them unavailable
    Unauthorized Access ↔️ Gaining access to systems without permission
  • Antivirus software uses signature-based detection to identify known virus patterns.patterns
  • Using both antivirus and antimalware software is recommended for optimal cybersecurity protection.

    True
  • A Denial-of-Service (DoS) attack overwhelms a system's resources
  • Match the cybersecurity threat with its description:
    Malware ↔️ Malicious software designed to disrupt systems
    Phishing ↔️ Attempts to trick users into revealing information
    DoS ↔️ Overwhelms system resources
    Unauthorized Access ↔️ Gaining access without permission
  • Intrusion Detection Systems (IDS) monitor network traffic and system logs
  • Order the steps involved in detecting an intrusion using a Network Intrusion Detection System (NIDS):
    1️⃣ Monitor network traffic
    2️⃣ Compare traffic to known attack patterns
    3️⃣ Identify suspicious behavior
  • Match the type of IDS with its focus:
    NIDS ↔️ Network-wide traffic
    HIDS ↔️ Individual host activity
  • Signature-based detection identifies intrusions by comparing traffic to known attack patterns.

    True
  • A Host Intrusion Detection System (HIDS) operates on individual hosts
  • Antimalware software provides broader protection against various malicious threats
  • Using both antivirus and antimalware software is recommended for comprehensive cybersecurity protection.

    True
  • Order the main functions of a firewall:
    1️⃣ Filtering network traffic
    2️⃣ Controlling access
    3️⃣ Protecting against cyber threats
  • What is the primary purpose of regular system backups?
    Ensure data availability
  • Match the backup type with its description:
    Full Backup ↔️ Complete copy of all data
    Incremental Backup ↔️ Backs up only changed data since last backup
    Differential Backup ↔️ Backs up all changed data since last full backup
  • Storing backups off-site is recommended to protect against physical disasters or ransomware attacks.

    True
  • What is the main goal of employee security training?
    Reduce human error
  • Phishing recognition is a key topic in employee security training.

    True
  • Three main types of authentication factors in multi-factor authentication
    1️⃣ Knowledge
    2️⃣ Possession
    3️⃣ Inherence
  • Why is MFA stronger than a single password?
    It combines multiple factors
  • Cybersecurity threats aim to compromise the confidentiality, integrity, or availability
  • What is malware designed to do?
    Disrupt or damage systems
  • Detecting and preventing cybersecurity threats is crucial for protecting digital assets.

    True
  • Match the type of IDS with its description:
    NIDS ↔️ Monitors network traffic
    HIDS ↔️ Operates on individual hosts
  • HIDS checks system logs and file integrity for suspicious actions.

    True
  • What two detection methods does antivirus software use?
    Signature-based and heuristic-based
  • Antimalware software often incorporates the capabilities of antivirus software
  • Using both antivirus and antimalware software is crucial for comprehensive protection.

    True
  • Match the type of software with its primary focus:
    Antivirus ↔️ Viruses
    Antimalware ↔️ Broad range of malware
  • A firewall filters network traffic based on source, destination, port, and protocol.
  • Why are regular system backups crucial for cybersecurity?
    Ensuring data availability
  • Match the type of backup with its description:
    Full Backup ↔️ Complete copy of all data
    Incremental Backup ↔️ Backs up only changed data since last backup
    Differential Backup ↔️ Backs up all changes since last full backup
  • Testing backups regularly is essential for ensuring data recovery in case of a disaster.

    True
  • Match the security training topic with its description:
    Phishing Recognition ↔️ Identifying phishing emails and scams
    Password Hygiene ↔️ Creating and managing strong passwords
  • Cybersecurity threats aim to compromise the confidentiality, integrity, or availability of computer systems, networks, or data.data
  • Order the steps in detecting an intrusion using a Network Intrusion Detection System (NIDS):
    1️⃣ Monitor network traffic
    2️⃣ Compare traffic to known attack patterns
    3️⃣ Identify deviations from normal behavior
    4️⃣ Detect suspicious activity
  • Antimalware software protects against a broader range of malicious threats than antivirus software.

    True
  • Cybersecurity threats aim to compromise the confidentiality, integrity, or availability of computer systems, networks, or data.integrity
  • Unauthorized access involves gaining access to systems or data without permission.
    True
  • What is the primary aim of cybersecurity threats?
    Compromise confidentiality, integrity, availability