Home »
Cyber Security
Cyber Security - Terms and Definitions (+MCQs)
By Vanka Manikanth, on April 12, 2020
1. Privacy
Privacy is like nobody sees what you are doing, but potentially knowing who you are. For example, you are privately at your own home. Nobody has an idea of what do you do at a time, but everybody knows that you are being located in this house. And take another example, as when you email your friend it is private to you and your friend but not publicly to everyone. And another example, when you have created a file with a password, only you have the key to unlock it then the data is private over there.
2. Anonymity
Anonymity is like doing all your activities by hiding your true identity and others can see your actions, but may not have an idea who you are.
For example, Browsing using the Tor browser and posting a message anonymously in any of the discussion forums.
Note: We will gonna learn about the Tor browser in upcoming lessons. As of now remember that Tor is a browser to access the dark web.
3. Vulnerability
Vulnerability is the weakness through which the hacker might penetrate and exploit. It's like loopholes. Generally, when building application mistakes might happen, referred to as bugs, there is no such problem with these bugs unless they harm the performance of the application, but those who have a severe risk impact are considered as vulnerabilities. OWASP has listed the Top 10 vulnerabilities in the Web-based, will have a deep look into it in another article.
4. Asset
An asset is which you value most? Whatever it might be like financial records, bank information, your mobile, your laptop, your email, etc. All your sensitive information and things are considered as an Asset. So based upon the Asset we have to do Risk assessment analysis.
5. Threat
A threat can cause by the vulnerability, so the threat is an event that may cause damage to your asset in whatever means. Threats are enabled by
For example, Malware is a threat that infects your system through vulnerability.
Cyber Security - Terms and Definitions MCQs
2) Which of the following is considered as Asset?
- Files
- Optical Cables
- It might be anything which has value and which is important to us can be considered as an Asset
Correct answer: 3
It might be anything which has value and which is important to us can be considered as an Asset
3) Do you think storing session id in the cookies might have a threat?
- Yes, it's a bad practice
- No its a good practice to store in cookies
- Not sure
Correct answer: 1
Yes, it's a bad practice
4) To have private from the browser with IP changing at regular intervals which browser is the best fit?
- Any browser is okay
- Tor browser
- Chrome with Incognito mode
Correct answer: 2
Tor browser
6) Mr.Bob is using Gmail in Tor to sent the mail to his loved ones Do you think that his mail will be sent anonymous name?
- No, your username is visible to her
- Yes using Tor all your mails will be sent anonymously
- Not Sure
Correct answer: 1
No, your username is visible to her
8) Flooding lots of traffic to an application by a threat agent and an application cannot be accessible comes under which principle.
- As they are using Tor they are private in the discussion
- They private to some extent
- They have no privacy
Correct answer: 3
They have no privacy
They have no privacy though they are using Tor, they were chatting in the Public discussion forum with their Usernames as Jack and Martin.
9) ____________Analaysis is mandatory before you develop an app or create a network.
- Risk
- Private
- No assessment is required if we are confident enough
Correct answer: 1
Risk
Risk analysis is required whatever you are trying to built.
10) Ms.Rose has done multiple risk analysis and she is confident enough to say 100 percent security is provided to the asset.
- Yes if she is confident then no problem
- There is no such 100 percent security and 0 percent risk
- Not sure
Correct answer: 2
There is no such 100 percent security and 0 percent risk