Cybersecurity terms

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

study guide for cybersecurity

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

What are the 4 categories of security controls

The four categories of security controls are administrative, technical, physical, and operational controls, each designed to protect information and systems in different ways.

2
New cards

What are examples of Technical security controls

Examples of technical security controls include firewalls, encryption, intrusion detection systemsIDS/intrusion protection systemsIPS, and antivirus software.

3
New cards

What are the types of administrative security controls

a.      Policy

b.     Procedures

c.      Incident response plan IRP

d.     Business continuity plan BCP

e.      Data classification

4
New cards

What are the types of physical security controls

a.      Fences

b.     Cameras

c.      Gates

d.     guards

5
New cards

what are operational security controls

they are controls done by people and fall under several of the categories of security controls

6
New cards

what are the security types (what they try to accomplish)

a.      Preventative

b.     Deterrent

c.      Detective

d.     Corrective

e.      compensating

f.        Recovery

g.      directive

7
New cards

What are the methods of preventative controls

a.      Encryption

b.     App filtering

c.      Access control system

8
New cards

what are the three methods for deterrent control type 

A Signs

B cameras/cctv

C Guards

9
New cards

what are the three methods for detective control type 

A cctv/cameras

B IPS/IDS

C SIEM Security Information and Event Management (logs)

10
New cards

what are the three methods for corrective control type 

A backup/restore

B IRP (incident response plan)

C DRP Disaster recovery plan

11
New cards

what are the two methods for compensating control type 

A segmentation

B Virtualization

12
New cards

what are the three methods for recovery control type 

A Backup and recovery

B DRP Disaster recovery plan

C BCP  Business continuity plan

13
New cards

what are the three methods for directive control type 

A AUP acceptable use policy

B password policy

C data classification policy

14
New cards

What is the secuirty triad

Confidentiality

Integrity

Availability

15
New cards

What is confidentiality in cyber security

keeping data only for the authorized user

16
New cards

What is integrity when it comes to data in Cybersecurity

Ensure data remains accurate, consistent, and unaltered during storage, transmission, and processing.

17
New cards

what is availability of data for cyber security

Ensure authorized users have timely and uninterrupted access to resources and systems.

18
New cards

When discussing how to support the CIA triangle, there are several important concepts, including what?

A Non-repudiation

B Authenticity

C Accountability

D Principle of least privilege

19
New cards

What is Non-repudiation

Ensure that individuals can't deny their actions or transactions and enhance accountability, which helps strengthen the authenticity and integrity of information exchanges.

20
New cards

What is authenticity?

Confirming the legitimacy of users, data sources, and communications helps ensure that information is accurate, trustworthy, and free from unauthorized alterations.

21
New cards

What is accountability?

Establishing a traceable record of actions and activities that make individuals responsible for their actions contributes to the overall security and integrity of data, systems, and communications

22
New cards

What is the principle of lease privelage

Restricting user and system permissions to the minimum necessary level reduces potential attack surfaces and safeguards the confidentiality, integrity, and availability of resources

23
New cards

What can we use to ensure confidentiality

A encryption

B access control

C Use secure communication channels

24
New cards

What can we do to ensure data integrity

A Hashing

B Digital signatures

C Integrity Checks

25
New cards

What can we do to ensure availability of data

A Redundancy

B Load balance

C Backups