1/18
These flashcards cover the key concepts related to countermeasures in cybersecurity, focusing on different types of IT infrastructure, security classes, and protective measures against malicious software.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Traditional Infrastructure
Physical hardware installed on-premises requiring significant capital investment, managed internally by IT staff.
Cloud Infrastructure
Virtualized infrastructure hosted by third-party services, allowing access to IT resources via the internet on a pay-as-you-go basis.
Hybrid Infrastructure
Combines traditional on-premises IT infrastructure with cloud services for flexibility in workload management.
Data Infrastructure
Focuses on storing, managing, and processing data, ensuring it is accessible and secure.
Application Infrastructure
Supports the deployment and management of software applications, whether on-premises or in the cloud.
Network Infrastructure
Encapsulates hardware and software resources for network connectivity, communication, and management.
Physical Infrastructure
The foundational hardware and environment supporting the operation of IT systems and services.
Devices Security
Protects hardware components including servers and mobile devices with measures such as encryption and endpoint protection.
Media Security
Secures data storage media integrity, confidentiality, and availability through encryption and access controls.
Security Topologies
Design and architecture of a network's security framework, governing how security measures are applied.
Intrusion Detection Systems (IDS)
Tools that monitor for malicious activities and policy violations within IT infrastructures.
Security Baseline
Establishes minimum security standards for all systems and components to maintain a secure environment.
Application Hardening
Securing applications by reducing vulnerabilities through best practices and security configurations.
Firewalls
Devices or software that monitor and control incoming and outgoing network traffic based on security rules.
VPN (Virtual Private Network)
Enables secure communication over untrusted networks by encrypting traffic between devices.
Honeypots
Decoy systems designed to lure attackers and observe their actions without risking real assets.
DMZ (Demilitarized Zone)
A buffer network separating an internal network from the internet, hosting public-facing services while protecting internal networks.
Network Monitoring
Tools that continuously observe network traffic and performance to detect issues or security threats.
Malicious Software Protection Programs
Tools like Antivirus that detect, block, and remove malware from systems.