1/47
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Insider Threat
This threat actor is usually an employee.
Network Segmentation
We can accomplish this with Subnetting/VLAN-ing, Firewalls.
Symmetric Encryption
Uses the same key to encrypt and decrypt, e.g., AES, DES.
Asymmetric Encryption
Uses different keys to encrypt and decrypt, e.g., RSA, SHA.
PHI/ePHI
Health-related data.
PCI CHD
Credit card and debit card data (Payment Card Industry Cardholder Data).
PII
SSNs, DOBs, and Driver License Numbers.
BEC
Business Email Compromise (not Business Enterprise Compromise).
CFAA
The US Federal Law that Prohibits Hacking (Computer Fraud and Abuse Act).
US Federal Law Types
Civil (Tort), Criminal, Administrative.
FERPA
Protects Student Data.
State Cyber Laws Types
Data Disposal, Data Privacy, Data Security, Breach Notification.
Wisconsin State Cyber Laws
Wi Act 73 for Insurance, Wi Statute 134.97, Wi Statute 134.98.
CCPA/CPRA
The most substantial State Cybersecurity Privacy Law in the US.
GDPR
The most widely followed global cybersecurity data security and privacy law.
NIST 800-61
NIST SP for Incident Response - The Computer Security Incident Handling Guide.
Attribution
The act of determining who the threat actor is.
Incident Response Plan Importance
Helps think clearly during an IT Security event, has contact info and response/recovery procedures.
Zero Trust
Presumes that the network is 'always hostile' and authentication should be continuously validated.
GRC
Governance, Risk, and Compliance (Confidentiality is not included).
SLE
$25,000 (for AV = $25,000).
ARO
.1 (for AV = $250,000 and 10-year replacement cycle with ALE = $25,000).
Single Loss Expectancy (SLE)
The cost to replace an asset one-time.
ALE
Annual Loss Expectancy.
Risk Transferrence Example
Cyber Insurance or Flood Insurance.
Policy
The most broad type of security documentation.
NIST Frameworks
NIST Cybersecurity, NIST Risk Mgmt & AI Risk Mgmt, NIST Privacy.
NIST SP 800-53
Followed by Federal government agencies.
NIST SP 800-171
Used by organizations supporting the Federal Government.
CIS IG3
The most complex CIS IG.
SOC 2 Type 1
A Point in Time Assessment.
SOC 2 Type 2
A Period of Time Assessment.
COBIT and ITIL
IT Management Frameworks.
Healthcare Security
HIPAA, HITECH, HITRUST.
CIA Triad
Confidentiality, Integrity, Availability.
Threat
An outside force that could do us harm.
Vulnerability
A negative quality of our asset.
Risk
When a threat and vulnerability come together.
High Availability Firewalls (HAFs)
'2 Firewalls in a System'.
IDS/IPS
Intrusion Detection, Intrusion Prevention.
Backup Types
Data, Power, Connectivity.
Security Software Types
Anti-virus/Anti-malware, SIEM/SOAR, DLP/FIM, ESG/Phishing Awareness.
Vulnerability Management Tasks
Vulnerability Scanning, Penetration Testing, Threat Modeling.
Defense in Depth
A layered security approach.
ISO27001/27002
A globally recognized security framework.
CMMC
Protects ITAR, CUI, FCI.
Banking/Finance Data Security
GLBA, FFIEC.
SOX Applicability
Applies to Publicly-Traded companies (not privately-held companies).