Cybersecurity Techniques Unit 1

0.0(0)
studied byStudied by 2 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

(January 2026 onwards until the end of the school year is cybersecurity techniques)

Last updated 1:02 PM on 1/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

28 Terms

1
New cards

Security

An ongoing process of protecting systems, networks, and data through assessment, implementation, monitoring, response, and deterrence.

2
New cards

Security Controls

Safeguards or countermeasures put in place to protect information systems and data assets.

3
New cards

Security Posture

An organizations overall security strength based on its policies, controls, and frameworks

4
New cards

Confidentiality

Ensures that data is not disclosed to unauthorized persons.

5
New cards

Integrity

Ensures that data is accurate and has not been modified or tampered with.

6
New cards

Availability

Ensures that systems and data are accessible when needed by authorized users.

7
New cards

Sophisticated Attacks

Complex attacks that use common tools and varying behaviors, making them difficult to detect.

8
New cards

Proliferation of Attack Software

The widespread availability of attack tools that allows many users to launch attacks.

9
New cards

Attack Scale and Velocity

The speed and size at which modern attacks can spread across large numbers of systems.

10
New cards

Managerial Controls

Controls that provide oversight, planning, and decision making for security systems.

11
New cards

Operational Controls

Controls that are primarily implemented and performed by people.

12
New cards

Technical Controls

Controls implemented through hardware, software, or firmware to protect systems and data.

13
New cards

Physical controls

Non-technical controls that protect facilities and hardware, such as locks, alarms, and cameras.

14
New cards

Preventive Controls

Controls that operate before an attack to reduce the likelihood of success

15
New cards

Detective Controls

Controls taht identify and record attacks while they are occurring.

16
New cards

Corrective Controls

Controls used after an attack to reduce impact and restore systems or data.

17
New cards

Directive Controls

Controls that enforce rules of behavior through policies, standards, or procedures.

18
New cards

Deterrent Controls

Controls that discourage attacks by warning of consequences rather than stopping access.

19
New cards

Compensating Controls

Alternative controls used when required controls cannot be implemented, providing equivalent protection.

20
New cards

Security Policy.

A formal document that defines how an organization protects its data and systems.

21
New cards

Best Practice Frameworks

Established guidelines that help organizations implement effective security controls.

22
New cards

Compliance

Meeting legal, regulatory, and standards-based security requirements.

23
New cards

Security Operations Center (SOC)

A centralized location where security professionals monitor and protect information assets.

24
New cards

DevOps

A collaborative approach that integrates software development and IT operations.

25
New cards

DevSecOps

An extension of DevOps that embeds security into every stage of development and deployment.

26
New cards

Shift Left

The practice of addressing security early in the planning and development process.

27
New cards

Computer Incident Response Team (CIRT / CSIRT / CERT)

A dedicated team responsible for handling and responding to security incidents.

28
New cards

Risk Assessment

The process of identifying threats, vulnerabilities, and potential impacts.