The document provides a comprehensive overview of cybersecurity, including its definition, importance, and the CIA Triad principles of confidentiality, integrity, and availability. It outlines various types of cyber attacks, threats, vulnerabilities, and the seven layers of cybersecurity, emphasizing the role of human factors and motivations behind cybercriminal activities. Additionally, it discusses security policies, compliance frameworks like GDPR, and the digital forensics lifecycle.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
4 views5 pages
cyber_QA
The document provides a comprehensive overview of cybersecurity, including its definition, importance, and the CIA Triad principles of confidentiality, integrity, and availability. It outlines various types of cyber attacks, threats, vulnerabilities, and the seven layers of cybersecurity, emphasizing the role of human factors and motivations behind cybercriminal activities. Additionally, it discusses security policies, compliance frameworks like GDPR, and the digital forensics lifecycle.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
Cybersecurity Q&A
Cybersecurity Basics
Q1: What is cyber security?
Cybersecurity is the practice of protecting internet-connected systems (hardware, software, data) from digital attacks, damage, or unauthorized access through coordinated people, processes, and technologies.
Q2: What three elements does cybersecurity encompass?
Threat reduction; vulnerability management; incident response; deterrence; resiliency & recovery; international engagement; information assurance; law-enforcement cooperation; and computer network operations.
Q3: Why is cybersecurity important?
It prevents financial losses; protects reputation; defends against sophisticated threats; ensures regulatory compliance (e.g., GDPR); and supports business continuity through proper response planning.
The CIA Triad (Fundamentals)
Q4: What are the three principles of the CIA Triad?
Confidentiality, Integrity, and Availability.
Q5: Define confidentiality.
Ensuring information is accessible only to authorized users, typically via encryption, access controls, and authentication.
Q6: Define integrity.
Ensuring data remains accurate and unaltered except by authorized actions, typically via checksums, digital signatures, and permissions.
Q7: Define availability.
Ensuring authorized users can access systems and data when needed, typically via backups, redundancy, and fault-tolerant design.
Q8: List 5 methods to enforce confidentiality.
Data encryption; access control lists; two-factor authentication; security tokens/smart cards; biometric verification.
Q9: List 5 methods to enforce integrity.
Cryptographic hash functions; digital signatures; checksums; file permissions; regular backups. Q10: List 5 methods to enforce availability. Data backups; redundant systems/failover; uninterruptible power supplies; firewalls/IPS; patch management.
Cyber Attacks
Q11: What is a cyber attack?
A deliberate exploitation of computer systems or networks using malicious code to alter code, logic, or data, leading to crimes like identity theft.
Q12: What are the two main categories of cyber attacks?
Any potential incident, event, or action—intentional or accidental—that can harm an asset by compromising confidentiality, integrity, or availability.
Q16: What is a vulnerability?
A weakness or flaw in a system that can be exploited to compromise confidentiality, integrity, or availability. Q17: What is risk? The potential for loss when a threat exploits a vulnerability; often conceptualized as Risk = Threat × Vulnerability × Impact.
Q18: Distinguish threats vs. vulnerabilities.
A threat is the potential danger (e.g., hacker, tornado); a vulnerability is the condition that allows it (e.g., unpatched software, weak password).
Q19: What are the three categories of vulnerabilities?
Corrupted (loss of integrity); Leaky (loss of confidentiality); Unavailable/Slow (loss of availability).
The core data or systems (e.g., customer database, source code) an organization must protect above all else.
Q22: Give an example of Application Security.
Input validation to prevent SQL injection; use of a Web Application Firewall (WAF).
Q23: What is Endpoint Security?
Protection of devices (laptops, phones) via antivirus, encryption, mobile device management, and port control.
Q24: Why is the Human Layer vital?
Humans are the weakest link; training, phishing simulations, and strong access policies mitigate human error or insider threats.
Cyber Criminals & Motivations
Q25: Why are computer criminals dangerous?
They exploit vast hardware, software, and data resources to cripple businesses/governments, steal info, and disrupt services. Q26: Name three motivations of deliberate attackers. Political (espionage, sabotage); Economic (theft, fraud); Socio-cultural (publicity, curiosity, ideology).
Security Policies & Compliance
Q27: What is GDPR?
The EU’s General Data Protection Regulation governing personal data collection, processing, and storage with strict user rights and penalties.
Q28: Name two other frameworks like GDPR.
NIST Cybersecurity Framework (CSF) and ISO/IEC 27001 Information Security Management.
Q29: Why have security policies?
They enforce rules, increase accountability, educate employees, ensure compliance, and can make or break business deals.
Digital Forensics
Q30: What is digital forensics?
The science of preserving, identifying, extracting, and documenting electronic evidence for legal use.
Header Analysis; Bait Tactics (tracking via embedded image links).
Q33: Give an example of a digital forensics tool.
MiTec Mail Viewer for inspecting email databases; eMailTrackerPro for IP tracing via headers.
Mobile & Wireless Security
Q34: Why protect mobile devices?
They store sensitive data and access corporate networks; loss/theft or malware can expose critical info.
Q35: List two common mobile threats.
Smishing (SMS phishing) and malware hidden in apps. Q36: Name one security control for mobile devices. Mobile Application Management (MAM) to control app data and permissions.