Cyber Security Security + Study Guide

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

This set of flashcards covers key concepts and terminology related to Cyber Security, including security controls, the CIA triad, digital signatures, change management, and various encryption methods.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

24 Terms

1
New cards

What are the four categories of security controls in Cyber Security?

Technical, Managerial, Operational, Physical.

2
New cards

What does the Preventive control type do?

Stops attacks before they happen.

3
New cards

What is the CIA Triad?

Confidentiality, Integrity, Availability.

4
New cards

What is the purpose of multi-factor authentication?

To provide extra proof before granting access.

5
New cards

What does nonrepudiation guarantee?

That the sender cannot deny sending the message.

6
New cards

What is a digital signature?

A hash that is encrypted with the sender's private key.

7
New cards

What are the three components of the AAA Framework?

Authentication, Authorization, Accounting.

8
New cards

What is the difference between a Public Key and a Private Key?

Public key is shared with everyone; Private key is kept secret by the owner.

9
New cards

What does Gap Analysis compare?

The current state with the baseline.

10
New cards

What is Zero Trust Architecture based on?

Nothing is trusted, everything must be verified every time.

11
New cards

What does the Policy Enforcement Point (PEP) do in Zero Trust?

Gathers info and enforces decisions regarding access.

12
New cards

What is a honeypot?

A fake system designed to attract attackers to study their techniques.

13
New cards

What is the main purpose of change control?

To maintain uptime and availability, and ensure everyone is informed.

14
New cards

What does a digital certificate contain?

A public key and a digital signature.

15
New cards

What is the difference between hashing and encryption?

Hashing is a one-way function while encryption can be reversed with the key.

16
New cards

What is Blockchain technology?

A distributed ledger that is tamper-resistant and provides integrity through hashing.

17
New cards

What does the Certificate Authority (CA) do?

Signs digital certificates and provides trust.

18
New cards

What are the two types of encryption keys in asymmetric encryption?

Public key for encryption and private key for decryption.

19
New cards

What is the purpose of tokenization?

To replace sensitive data with a meaningless token that has no mathematical relationship to the original.

20
New cards

What is the use of a backout plan in change management?

To document steps to revert specific changes if something goes wrong.

21
New cards

What is key management in a security context?

Centralized control of all cryptographic keys.

22
New cards

What does OCSP provide in relation to digital certificates?

Real-time certificate status checking.

23
New cards

What is the purpose of salting in password storage?

To ensure different hashes for the same password by adding random data.

24
New cards

What is a honeyfile?

A fake file that looks valuable and triggers an alert when accessed.