Cybersecurity Fundamentals: Chapter 3 - Countermeasure in Cybersecurity

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

These flashcards cover the key concepts related to countermeasures in cybersecurity, focusing on different types of IT infrastructure, security classes, and protective measures against malicious software.

Last updated 5:21 AM on 4/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

Traditional Infrastructure

Physical hardware installed on-premises requiring significant capital investment, managed internally by IT staff.

2
New cards

Cloud Infrastructure

Virtualized infrastructure hosted by third-party services, allowing access to IT resources via the internet on a pay-as-you-go basis.

3
New cards

Hybrid Infrastructure

Combines traditional on-premises IT infrastructure with cloud services for flexibility in workload management.

4
New cards

Data Infrastructure

Focuses on storing, managing, and processing data, ensuring it is accessible and secure.

5
New cards

Application Infrastructure

Supports the deployment and management of software applications, whether on-premises or in the cloud.

6
New cards

Network Infrastructure

Encapsulates hardware and software resources for network connectivity, communication, and management.

7
New cards

Physical Infrastructure

The foundational hardware and environment supporting the operation of IT systems and services.

8
New cards

Devices Security

Protects hardware components including servers and mobile devices with measures such as encryption and endpoint protection.

9
New cards

Media Security

Secures data storage media integrity, confidentiality, and availability through encryption and access controls.

10
New cards

Security Topologies

Design and architecture of a network's security framework, governing how security measures are applied.

11
New cards

Intrusion Detection Systems (IDS)

Tools that monitor for malicious activities and policy violations within IT infrastructures.

12
New cards

Security Baseline

Establishes minimum security standards for all systems and components to maintain a secure environment.

13
New cards

Application Hardening

Securing applications by reducing vulnerabilities through best practices and security configurations.

14
New cards

Firewalls

Devices or software that monitor and control incoming and outgoing network traffic based on security rules.

15
New cards

VPN (Virtual Private Network)

Enables secure communication over untrusted networks by encrypting traffic between devices.

16
New cards

Honeypots

Decoy systems designed to lure attackers and observe their actions without risking real assets.

17
New cards

DMZ (Demilitarized Zone)

A buffer network separating an internal network from the internet, hosting public-facing services while protecting internal networks.

18
New cards

Network Monitoring

Tools that continuously observe network traffic and performance to detect issues or security threats.

19
New cards

Malicious Software Protection Programs

Tools like Antivirus that detect, block, and remove malware from systems.