Cards (27)

    • What is the primary purpose of cybersecurity?
      Protect systems from attacks
    • What is malware designed to do?
      Harm or disrupt systems
    • Using strong passwords is a preventive measure against cybersecurity threats.

      True
    • Being cautious of suspicious emails is a preventive measure against phishing attacks.

      True
    • What three types of characters should be included in a strong password?
      Letters, numbers, and symbols
    • What is the purpose of encryption in cybersecurity?
      Protect sensitive information
    • Which physical security measure corresponds to firewalls in cybersecurity?
      Alarms and security guards
    • What does a VPN do in cybersecurity?
      Secure encrypted connection
    • What type of information does HIPAA protect in the United States?
      Sensitive health information
    • Match the cybersecurity legislation/policy with its description:
      GDPR ↔️ Regulates the collection of personal data
      HIPAA ↔️ Protects patient health information
      CMMC ↔️ Sets cybersecurity standards for defense contractors
      NIST Cybersecurity Framework ↔️ Provides guidelines for managing risk
    • Cybersecurity measures include firewalls, encryption, and access controls
    • What does DDoS stand for?
      Distributed Denial-of-Service
    • What does encryption convert data into?
      Secret code
    • Order the key cybersecurity practices for safeguarding digital assets:
      1️⃣ Use strong passwords
      2️⃣ Keep software updated
      3️⃣ Implement firewalls
      4️⃣ Encrypt data
      5️⃣ Restrict access privileges
    • Firewalls act as a barrier between a computer and the internet.

      True
    • Match the cybersecurity practice with its physical security equivalent:
      Strong passwords ↔️ Locks and keys
      Software updates ↔️ Regular maintenance
    • Antivirus software detects and prevents malicious software like viruses, worms, and trojans
    • The General Data Protection Regulation (GDPR) is a European Union law that regulates the collection and processing of personal data.
    • The NIST Cybersecurity Framework provides guidelines for managing cybersecurity risk.

      True
    • Cybersecurity protects digital assets, while physical security protects physical assets.

      True
    • Phishing involves deceptive attempts to obtain sensitive information
    • Firewalls protect networks from unauthorized access
    • Strong passwords use a combination of letters, numbers, and symbols
    • Keeping software updated helps patch vulnerabilities that could be exploited by cybercriminals
    • Access control limits user privileges to only the functions they need
    • Arrange the following cybersecurity tools based on their primary purpose:
      1️⃣ Firewalls (Monitor and control network traffic)
      2️⃣ Antivirus/Anti-malware Software (Detect and remove malicious software)
      3️⃣ Encryption (Convert data into secret code)
      4️⃣ Virtual Private Networks (VPNs) (Establish secure connection)
      5️⃣ Intrusion Detection/Prevention Systems (Detect malicious activity)
      6️⃣ Security Information and Event Management (SIEM) (Analyze security data)
    • Cybersecurity legislation and policies ensure the security and privacy of digital information.

      True
    See similar decks