Cybersecurity Kahoot for Final Exam

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:12 AM on 12/14/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

48 Terms

1
New cards

Insider Threat

This threat actor is usually an employee.

2
New cards

Network Segmentation

We can accomplish this with Subnetting/VLAN-ing, Firewalls.

3
New cards

Symmetric Encryption

Uses the same key to encrypt and decrypt, e.g., AES, DES.

4
New cards

Asymmetric Encryption

Uses different keys to encrypt and decrypt, e.g., RSA, SHA.

5
New cards

PHI/ePHI

Health-related data.

6
New cards

PCI CHD

Credit card and debit card data (Payment Card Industry Cardholder Data).

7
New cards

PII

SSNs, DOBs, and Driver License Numbers.

8
New cards

BEC

Business Email Compromise (not Business Enterprise Compromise).

9
New cards

CFAA

The US Federal Law that Prohibits Hacking (Computer Fraud and Abuse Act).

10
New cards

US Federal Law Types

Civil (Tort), Criminal, Administrative.

11
New cards

FERPA

Protects Student Data.

12
New cards

State Cyber Laws Types

Data Disposal, Data Privacy, Data Security, Breach Notification.

13
New cards

Wisconsin State Cyber Laws

Wi Act 73 for Insurance, Wi Statute 134.97, Wi Statute 134.98.

14
New cards

CCPA/CPRA

The most substantial State Cybersecurity Privacy Law in the US.

15
New cards

GDPR

The most widely followed global cybersecurity data security and privacy law.

16
New cards

NIST 800-61

NIST SP for Incident Response - The Computer Security Incident Handling Guide.

17
New cards

Attribution

The act of determining who the threat actor is.

18
New cards

Incident Response Plan Importance

Helps think clearly during an IT Security event, has contact info and response/recovery procedures.

19
New cards

Zero Trust

Presumes that the network is 'always hostile' and authentication should be continuously validated.

20
New cards

GRC

Governance, Risk, and Compliance (Confidentiality is not included).

21
New cards

SLE

$25,000 (for AV = $25,000).

22
New cards

ARO

.1 (for AV = $250,000 and 10-year replacement cycle with ALE = $25,000).

23
New cards

Single Loss Expectancy (SLE)

The cost to replace an asset one-time.

24
New cards

ALE

Annual Loss Expectancy.

25
New cards

Risk Transferrence Example

Cyber Insurance or Flood Insurance.

26
New cards

Policy

The most broad type of security documentation.

27
New cards

NIST Frameworks

NIST Cybersecurity, NIST Risk Mgmt & AI Risk Mgmt, NIST Privacy.

28
New cards

NIST SP 800-53

Followed by Federal government agencies.

29
New cards

NIST SP 800-171

Used by organizations supporting the Federal Government.

30
New cards

CIS IG3

The most complex CIS IG.

31
New cards

SOC 2 Type 1

A Point in Time Assessment.

32
New cards

SOC 2 Type 2

A Period of Time Assessment.

33
New cards

COBIT and ITIL

IT Management Frameworks.

34
New cards

Healthcare Security

HIPAA, HITECH, HITRUST.

35
New cards

CIA Triad

Confidentiality, Integrity, Availability.

36
New cards

Threat

An outside force that could do us harm.

37
New cards

Vulnerability

A negative quality of our asset.

38
New cards

Risk

When a threat and vulnerability come together.

39
New cards

High Availability Firewalls (HAFs)

'2 Firewalls in a System'.

40
New cards

IDS/IPS

Intrusion Detection, Intrusion Prevention.

41
New cards

Backup Types

Data, Power, Connectivity.

42
New cards

Security Software Types

Anti-virus/Anti-malware, SIEM/SOAR, DLP/FIM, ESG/Phishing Awareness.

43
New cards

Vulnerability Management Tasks

Vulnerability Scanning, Penetration Testing, Threat Modeling.

44
New cards

Defense in Depth

A layered security approach.

45
New cards

ISO27001/27002

A globally recognized security framework.

46
New cards

CMMC

Protects ITAR, CUI, FCI.

47
New cards

Banking/Finance Data Security

GLBA, FFIEC.

48
New cards

SOX Applicability

Applies to Publicly-Traded companies (not privately-held companies).