Security Controls and Incident Response - Vocabulary Flashcards

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards covering key terms and concepts from the lecture notes on security controls and incident response.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Security Controls

Tools to protect computers, networks, and data.

2
New cards

Incident Response

An organized plan to find, stop, and fix security problems.

3
New cards

Firewalls

Devices or software that block unwanted internet traffic.

4
New cards

Encryption

Process of scrambling data so only authorized people can read it.

5
New cards

Access Controls

Mechanisms that limit access to sensitive areas or resources.

6
New cards

Monitoring Tools

Systems that watch for suspicious or anomalous activity.

7
New cards

Authentication

Verifies who you are (e.g., passwords, biometrics).

8
New cards

Authorization

Grants permission to access specific resources.

9
New cards

Backup & Recovery

Processes to restore lost data after an incident.

10
New cards

Security Awareness & Training

Programs to reduce human error and teach safe practices (e.g., phishing awareness).

11
New cards

Phishing

A social engineering attack to trick users into revealing credentials or clicking malicious links.

12
New cards

Prepare

Have a plan and tools ready before an incident occurs.

13
New cards

Detect

Identify unusual or unauthorized activity quickly.

14
New cards

Contain

Stop the attack from spreading to other systems.

15
New cards

Fix

Remove threats and patch weaknesses in the environment.

16
New cards

Recover

Safely restore systems and operations after an incident.

17
New cards

Review

Learn from the incident to improve defenses and responses.

18
New cards

Target Data Breach (2013)

One of the largest retail cyberattacks; attackers used a weak vendor system; 40 million credit cards stolen; lesson: vendor security matters.

19
New cards

Zero Trust Security

Principle of never trusting by default; always verify before granting access.

20
New cards

EDR Tools

Endpoint Detection and Response tools that detect and stop threats on devices.

21
New cards

Bruce Schneier

Security and cryptography expert.

22
New cards

Gene Spafford

Advocate for safe and robust network design.

23
New cards

NIST SP 800-61

Computer Security Incident Handling Guide.