core concepts in cybersecurity

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:42 PM on 11/24/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

50 Terms

1
New cards

What does the CIA Triad stand for in cybersecurity?

Confidentiality, Integrity, and Availability

2
New cards

What principle ensures sensitive information is only accessible to authorized users?

Confidentiality

3
New cards

Name a key technique used to ensure confidentiality of data.

Encryption

4
New cards

What is the role of hashing in data integrity?

Hashing creates a unique identifier for data, making unauthorized modifications detectable.

5
New cards

What principle focuses on maintaining the accuracy and consistency of data?

Integrity

6
New cards

What are access controls used for in cybersecurity?

They limit access to data based on user roles, ensuring only authorized personnel can access sensitive information.

7
New cards

What ensures that data is accessible when needed without disruptions?

Availability

8
New cards

Name a technique used to enhance availability in systems.

Redundancy, like using backup systems or RAID arrays.

9
New cards

Which act mandates confidentiality measures in the healthcare sector?

Health Insurance Portability and Accountability Act (HIPAA)

10
New cards

What does the Bell-LaPadula model focus on?

The principle of confidentiality.

11
New cards

In risk management, what are the two primary methods used for conducting risk assessments?

Qualitative and Quantitative risk assessments.

12
New cards

What role does encryption play in data security?

It protects sensitive information by transforming it into an unreadable format.

13
New cards

Why is change management important in cybersecurity?

It minimizes risks associated with changes to the IT environment.

14
New cards

What does a layered security approach entail?

Implementing multiple layers of security controls to protect systems and data.

15
New cards

What is the purpose of threat modeling in cybersecurity?

To simulate potential attack scenarios to identify vulnerabilities.

16
New cards
17
New cards
18
New cards
19
New cards
20
New cards
21
New cards
22
New cards
23
New cards
24
New cards
25
New cards
26
New cards
27
New cards
28
New cards
29
New cards
30
New cards
31
New cards
32
New cards
33
New cards
34
New cards
35
New cards
36
New cards
37
New cards
38
New cards
39
New cards
40
New cards
41
New cards
42
New cards
43
New cards
44
New cards
45
New cards
46
New cards
47
New cards
48
New cards
49
New cards
50
New cards