Cyber Security Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts in cyber security, including definitions, security goals, attack types, and security services.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Cyber Security

A process designed to protect networks and devices from external threats; the protection of Internet-connected systems from cyber-attacks.

2
New cards

Need of Cyber Security (for businesses)

To protect confidential information, maintain employee productivity, and enhance customer confidence in products and services.

3
New cards

Layers of Cyber Security

Mission Critical Assets, Data Security, Application Security, Endpoint Security, Network Security, Perimeter Security, The Human Layer

4
New cards

Confidentiality

Preventing the disclosure of data to unauthorized parties.

5
New cards

Integrity

Protecting information from being modified by unauthorized parties.

6
New cards

Availability

Making sure that authorized parties are able to access the information when needed.

7
New cards

Snooping

Unauthorized access to or interception of data.

8
New cards

Traffic Analysis

Obtaining information by monitoring online traffic (e.g., email addresses).

9
New cards

Modification (Attack on Integrity)

Modifying information after intercepting or accessing it.

10
New cards

Masquerading

When the attacker impersonates somebody else.

11
New cards

Replaying

To replay the message sent to a network by an attacker which an authorized user earlier sent.

12
New cards

Repudiation

The sender or receiver denies having sent or received a message.

13
New cards

Denial of Service (DoS)

Slows down or totally interrupts the service of a system.

14
New cards

Passive Attack

The attacker’s goal is just to obtain information without modifying data or harming the system.

15
New cards

Active Attack

An attack that may change the data or harm the system.

16
New cards

Security Services

Authentication, Access Control, Data Confidentiality, Data Integrity, Non-repudiation.

17
New cards

Authentication

Verifying the identity of a user, process, or device.

18
New cards

Access Control

The prevention of unauthorized use of a resource.

19
New cards

Data Confidentiality

The protection of data from unauthorized disclosure.

20
New cards

Data Integrity

Assures that messages are received as sent with no duplication, insertion, modification, reordering, or replays.

21
New cards

Nonrepudiation

Prevents either sender or receiver from denying a transmitted message.