Cybersecurity: CIA Triad, Security Controls, and Network Segmentation

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

CIA Triad

Confidentiality - Protecting data from unauthorized access

2
New cards

Types of Security Controls

Physical Controls - Fencing, locks, cameras, access cards

3
New cards

Control Purposes

Preventative - Stop incidents (password requirements, firewalls)

4
New cards

Common Vulnerability Categories

Environmental issues (power loss, temperature, humidity)

5
New cards

Environmental Controls

UPS / generators for power

6
New cards

Virtual Machines (VMs)

Provide isolated sandboxes for testing untrusted software safely

7
New cards

Physical Security

Use layered protection: fencing, cameras, guards

8
New cards

MAC Spoofing

Attacker impersonates another device's MAC address

9
New cards

MAC Flooding

Overloads CAM table → switch broadcasts all frames

10
New cards

Signs of MAC Flooding

Unknown MACs, rapid MAC changes, multiple MACs on one port

11
New cards

Port Security Measures

Limit number of MAC addresses per port

12
New cards

Firewall Types

Host-based - Protect a single device

13
New cards

Why Segment a Network?

Improves security by isolating sensitive devices

14
New cards

VLANs (Virtual Local Area Networks)

Logically group devices into separate LAN segments

15
New cards

Creating VLANs

Identify network segmentation needs