3.6.1 Cyber security threats

Cards (40)

  • Order the steps in a cyber security attack from an external threat
    1️⃣ Attack originates outside the organization
    2️⃣ Targets sensitive data
    3️⃣ Disrupts operations
  • Phishing attacks often use fraudulent emails to obtain login credentials
  • Match the type of cyber threat with its description:
    Malware ↔️ Malicious software designed to cause damage
    Phishing ↔️ Deceptive attempts to obtain sensitive information
    DoS ↔️ Overwhelming systems with traffic
  • Insider threats involve malicious actions by current or former employees
  • What combination of measures is required to mitigate internal threats effectively?
    Security controls, training, monitoring
  • Understanding and mitigating cyber threats is essential for maintaining robust cyber security.

    True
  • Match the type of cyber threat with its definition:
    Malware ↔️ Malicious software designed to cause harm
    Phishing ↔️ Deceptive attempts to obtain sensitive information
    DoS ↔️ Overwhelming systems with traffic
  • Malware is malicious software designed to cause damage or gain unauthorized access
  • What does a Denial of Service (DoS) attack aim to do?
    Disrupt normal operations
  • External threats target sensitive data and aim to disrupt operations.

    True
  • Internal threats are cyber security risks that come from within the organization
  • What is a common example of human error that can lead to a security breach?
    Falling for phishing scams
  • Malware is malicious software designed to cause damage or gain unauthorized access
  • What is the primary goal of a Denial of Service (DoS) attack?
    Overwhelm systems with traffic
  • What is a cyber security threat?
    Malicious activity targeting systems
  • What does phishing involve?
    Obtaining sensitive information deceptively
  • Phishing attempts often use fake emails or websites
  • External threats originate from outside an organization's internal network.

    True
  • What type of threat uses fraudulent emails or websites to steal information?
    Phishing
  • Why is understanding cyber security threats important?
    To prevent data breaches
  • Phishing uses deceptive emails to obtain sensitive information.

    True
  • Match the cyber security threat with its definition:
    Malware ↔️ Malicious software to cause harm
    Phishing ↔️ Deceptive attempts to obtain information
    Denial of Service (DoS) ↔️ Overwhelming systems with traffic
  • What is the purpose of a Denial of Service (DoS) attack?
    To prevent legitimate access
  • Malware is malicious software
  • Match the type of cyber security threat with its description:
    Malware ↔️ Software designed to cause harm
    Phishing ↔️ Deceptive attempts to obtain data
    Denial of Service ↔️ Flooding systems with traffic
  • Malware is malicious software designed to cause damage
  • A Denial of Service (DoS) attack overwhelms systems with traffic
  • What is the purpose of malware in a cyber attack?
    Cause damage
  • Denial of Service (DoS) attacks aim to flood systems with traffic to make them unavailable.

    True
  • What is the primary difference between external and internal cyber threats?
    Origin of the threat
  • Human error, such as falling for phishing scams, can lead to security breaches.

    True
  • Cyber security threats are malicious activities that target computer systems, networks, and data
  • Some common types of cyber security threats include malware, phishing, and denial of service
  • Phishing involves deceptive attempts to obtain sensitive information through fake emails or websites.

    True
  • Cyber security threats can lead to data breaches and financial losses.
    True
  • External threats originate from outside an organization's internal network
  • What is the purpose of phishing attacks?
    Obtain sensitive information
  • Insider threats involve malicious actions by current or former employees.

    True
  • Steps to mitigate internal threats
    1️⃣ Implement security controls
    2️⃣ Provide employee training
    3️⃣ Monitor systems vigilantly
  • Phishing attempts use deceptive emails or websites to obtain sensitive information.

    True