Pre Security Module 1: Introduction to Cyber Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/52

flashcard set

Earn XP

Description and Tags

These flashcards cover the fundamental concepts, definitions, and tools related to cyber security as outlined in the lecture notes.

Last updated 2:08 PM on 4/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

53 Terms

1
New cards

What is Cyber Security?

The practice of protecting computers, networks, programs, and data from unauthorized access, damage, or attack.

2
New cards

Offensive Security

The discipline of identifying and exploiting vulnerabilities to find weaknesses in systems before criminals do.

3
New cards

Defensive Security

A practice focused on protecting systems, detecting threats, and responding to incidents.

4
New cards

Red Team

The offensive security team that simulates attackers.

5
New cards

Blue Team

The defensive security team responsible for detecting and responding to attacks.

6
New cards

SOC

Security Operations Centre - the team and facility that monitors for and responds to threats in real time.

7
New cards

Engagement

The formal written agreement between a pentester and an organization defining the scope and rules of a security test.

8
New cards

Reconnaissance (Recon)

The gathering of information about a target before attempting to exploit it.

9
New cards

dirb

A web directory enumeration tool that discovers hidden pages on a website.

10
New cards

IDS

Intrusion Detection System - a system that passively monitors traffic and raises alerts on suspicious patterns.

11
New cards

IPS

Intrusion Prevention System - actively blocks suspicious traffic in addition to detecting it.

12
New cards

SIEM

Security Information & Event Management - collects and correlates logs from across an organisation.

13
New cards

Firewall

A system that controls network traffic based on predefined security rules.

14
New cards

Rate Limiting

Restricting the number of requests a source can make in a given time window.

15
New cards

Access Control

Rules determining who can access what resources on a system.

16
New cards

Broken Access Control

A vulnerability where users can access resources or functions they should not be able to.

17
New cards

Containment

The immediate priority when an attack is confirmed, stopping further damage before full analysis.

18
New cards

Penetration Testing

Legally and ethically attempting to exploit vulnerabilities in a system under a formal agreement.

19
New cards

Red Teaming

A senior-level, full-scale, long-term simulated attack against an organisation.

20
New cards

Bug Bounty

A program where companies pay ethical hackers for reporting valid vulnerabilities.

21
New cards

OWASP Top 10

A regularly updated list of the ten most critical web application security risks.

22
New cards

The Attacker Mindset

The approach in offensive security that requires thinking creatively and adversarially.

23
New cards

Vulnerability Assessment

Identifies weaknesses but does not attempt to exploit them; lower risk and faster.

24
New cards

Penetration Testing (Pentesting)

Actively attempts to exploit vulnerabilities under a formal agreement.

25
New cards

Red Team Engagement

A full simulated attack against an organization, including physical and social engineering elements.

26
New cards

Bug Bounty Hunting

Companies invite ethical hackers to find vulnerabilities and reward them for valid reports.

27
New cards

Common Offensive Security Tools

Tools like dirb, Nmap, Metasploit, Burp Suite, Wireshark used for security assessments.

28
New cards

The Ethics of Offensive Security

The key difference between criminal hackers and ethical hackers is authorization.

29
New cards

The Golden Rule of Ethical Hacking

Never test a system you do not have written permission to test.

30
New cards

IP Blocking

A quick and effective first step that controls network traffic but is not a permanent solution.

31
New cards

Rate Limiting Importance

Protects against brute-force or enumeration attacks by controlling the number of requests.

32
New cards

Incident Response Lifecycle

A structured response process to attacks including identification, analysis, containment, eradication, recovery, and lessons learned.

33
New cards

SOC Analyst Roles

Includes Tier 1 monitoring alerts, Tier 2 investigating incidents, and Tier 3 proactively searching for hidden threats.

34
New cards

Containment in Incident Response

Stopping the attack immediately before fully analyzing it.

35
New cards

Skills for Security Analysts

Log analysis, threat intelligence, incident documentation, and familiarity with SIEM tools.

36
New cards

Day-to-Day Responsibilities of Security Analysts

Monitor SIEM dashboards, investigate alerts, create reports, and recommend security improvements.

37
New cards

What is a Security Engineer?

Builds and maintains defensive systems to protect an organization from attacks.

38
New cards

Main Responsibilities of Security Engineers

Design, deploy, and maintain security tools, assess attack surfaces, and write security policies.

39
New cards

The Role of Penetration Testers

Simulate attacks under controlled conditions to find exploitable vulnerabilities.

40
New cards

Red Teaming vs Penetration Testing

Red teaming simulates a full-scale attack, while penetration testing focuses on specific systems.

41
New cards

Certifications for Cyber Security Professionals

CompTIA Security+, CompTIA Network+, eJPT, CEH, OSCP are recommended starting points.

42
New cards

TryHackMe

A platform for practical, guided learning paths in cybersecurity.

43
New cards

Hack The Box

A more challenging, competitive platform for advanced cybersecurity skills.

44
New cards

PicoCTF / CTFtime

Capture The Flag competitions that enhance problem-solving skills for cybersecurity.

45
New cards

PortSwigger Web Security Academy

Offer free, world-class training for web application security.

46
New cards

Competitive Entry-Level Salaries

Reflect the growing demand for cybersecurity professionals.

47
New cards

Cyber Security Skills Gap

Over 3.5 million cybersecurity roles are currently unfilled globally.

48
New cards

Why Cyber Security Matters

Data breaches expose sensitive information and ransomware attacks can disrupt essential services.

49
New cards

Key Terms & Definitions

Understand terms like Offensive Security, Defensive Security, Reconnaissance, IDS, IPS, SIEM, Firewall.

50
New cards

Concepts in Offensive Security

Involves tools and techniques to identify and exploit vulnerabilities before criminals do.

51
New cards

Concepts in Defensive Security

Focus on building defenses, monitoring systems, and responding to incidents.

52
New cards

Salaries in Cyber Security

Entry-level roles can lead to competitive salaries reflecting constant growth in the field.

53
New cards

Importance of Continuous Learning

Maintaining up-to-date knowledge is crucial due to evolving threats in cybersecurity.

Explore top notes

note
Evolution
Updated 1160d ago
0.0(0)
note
Unit 1 - Chemistry of Life
Updated 1090d ago
0.0(0)
note
Nervous System & Mental Health
Updated 508d ago
0.0(0)
note
Chapter 3: Differentiation
Updated 1084d ago
0.0(0)
note
Required Documents
Updated 721d ago
0.0(0)
note
The Mole and Equations
Updated 1195d ago
0.0(0)
note
Beware of Banking Fees
Updated 1246d ago
0.0(0)
note
Evolution
Updated 1160d ago
0.0(0)
note
Unit 1 - Chemistry of Life
Updated 1090d ago
0.0(0)
note
Nervous System & Mental Health
Updated 508d ago
0.0(0)
note
Chapter 3: Differentiation
Updated 1084d ago
0.0(0)
note
Required Documents
Updated 721d ago
0.0(0)
note
The Mole and Equations
Updated 1195d ago
0.0(0)
note
Beware of Banking Fees
Updated 1246d ago
0.0(0)

Explore top flashcards

flashcards
Unit 5 Lesson 1
43
Updated 1062d ago
0.0(0)
flashcards
Unit 1-2 BIO Midterms
49
Updated 1133d ago
0.0(0)
flashcards
La inmigración
84
Updated 117d ago
0.0(0)
flashcards
Vocab Unit 5
25
Updated 1180d ago
0.0(0)
flashcards
apush
33
Updated 1220d ago
0.0(0)
flashcards
Biology - DNA to Protein
40
Updated 1214d ago
0.0(0)
flashcards
Unit 5 Lesson 1
43
Updated 1062d ago
0.0(0)
flashcards
Unit 1-2 BIO Midterms
49
Updated 1133d ago
0.0(0)
flashcards
La inmigración
84
Updated 117d ago
0.0(0)
flashcards
Vocab Unit 5
25
Updated 1180d ago
0.0(0)
flashcards
apush
33
Updated 1220d ago
0.0(0)
flashcards
Biology - DNA to Protein
40
Updated 1214d ago
0.0(0)