cybersecurity review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/128

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

129 Terms

1
New cards

Cybersecurity

Protection of computer systems from theft or damage.

2
New cards

Malware

Malicious software designed to harm or exploit systems.

3
New cards

Application Security

Measures to protect applications from threats.

4
New cards

Network Security

Protection of networks from unauthorized access.

5
New cards

Threats

Potential causes of unwanted incidents affecting security.

6
New cards

Vulnerabilities

Weaknesses that can be exploited by threats.

7
New cards

Risks

Potential for loss or damage when threats exploit vulnerabilities.

8
New cards

CIA Triad

Confidentiality, Integrity, Availability in information security.

9
New cards

Confidentiality

Ensuring information is not disclosed to unauthorized users.

10
New cards

Integrity

Maintaining accuracy and trustworthiness of data.

11
New cards

Availability

Ensuring authorized users have access to information.

12
New cards

Secure by Design

Principles ensuring security is integrated from the start.

13
New cards

Least Privilege

Users granted only necessary access rights.

14
New cards

Multiple Layers of Defence

Using various security measures to protect systems.

15
New cards

Complexity in Security

Increased complexity leads to higher security risks.

16
New cards

Incident Response

Processes for managing and mitigating security breaches.

17
New cards

Digital Forensics

Investigating cyber incidents to gather evidence.

18
New cards

Cyber Security Engineer

Professional designing and implementing security systems.

19
New cards

Cyber Security Consultant

Expert advising on security measures and strategies.

20
New cards

Security Architect

Designs security structures for IT systems.

21
New cards

Cyber Security Specialist

Focuses on specific security technologies or practices.

22
New cards

Security Risk & Compliance

Ensures adherence to security regulations and standards.

23
New cards

CompTIA Security+

Certification validating foundational cybersecurity skills.

24
New cards

Vulnerability Analysis

Identifying weaknesses in systems to improve security.

25
New cards

Software execution paradigms

Different methods for running software applications.

26
New cards

Secure development

Practices ensuring software is free from vulnerabilities.

27
New cards

Stack buffer overflow

Exceeding buffer size causing data overwrite on stack.

28
New cards

Virus

Self-replicating malware needing a host file.

29
New cards

Worm

Malware that spreads independently without a host.

30
New cards

Trojan

Malware disguised as legitimate software to deceive users.

31
New cards

Scareware

Malware using fear tactics to extort money.

32
New cards

Bots

Compromised devices forming a network for attacks.

33
New cards

DDoS attack

Distributed denial-of-service attack overwhelming a server.

34
New cards

SYN flood

Attack sending fake SYN requests to exhaust server resources.

35
New cards

Smurf attack

Spoofed ICMP requests causing network-wide echo replies.

36
New cards

Network scopes

Different ranges of network connectivity: LAN, WAN, Internet.

37
New cards

TCP/IP model

Framework for understanding internet communication protocols.

38
New cards

Secure protocols

Protocols ensuring data integrity and confidentiality.

39
New cards

Insecure protocols

Protocols vulnerable to interception and attacks.

40
New cards

Traffic control

Managing data flow using firewalls and IDS/IPS.

41
New cards

Firewalls

Devices filtering incoming and outgoing network traffic.

42
New cards

NAT

Network Address Translation for IP address management.

43
New cards

NIDS/NIDP

Network Intrusion Detection/Prevention Systems monitoring traffic.

44
New cards

Risk Management

Process of identifying and mitigating potential threats.

45
New cards

Threat dimensions

Factors influencing security threats: Agent, Motivation, Location.

46
New cards

Securing assets

Controlling access to protect valuable resources.

47
New cards

Authorized actors

Individuals permitted to access secured assets.

48
New cards

Threat

Potential harm to assets from unauthorized access.

49
New cards

Asset

Resource of value that requires protection.

50
New cards

Vulnerability

Weakness that can be exploited by threats.

51
New cards

Risk

Possibility of loss or harm occurring.

52
New cards

Information risk

Likelihood and impact of harm to information assets.

53
New cards

Likelihood

Probability of a threat exploiting a vulnerability.

54
New cards

Impact

Consequences of a threat materializing.

55
New cards

Enterprise risk management

Process of identifying and mitigating risks.

56
New cards

Identify

Determine existing risks in an organization.

57
New cards

Analyse

Assess severity and consequences of identified risks.

58
New cards

Treat

Decide on strategies to handle identified risks.

59
New cards

Monitor

Track changes in risk over time.

60
New cards

Report

Document and communicate risk management findings.

61
New cards

Quantitative Risk Assessment

Mathematical calculation of risk likelihood and impact.

62
New cards

Qualitative Risk Assessment

Assessment based on perceptions and predefined scales.

63
New cards

Annual Loss Expectancy (ALE)

Expected yearly loss calculated as SLE x ARO.

64
New cards

Risk Matrix

Combines impact and likelihood values for risk assessment.

65
New cards

Risk Calculation

Risk = Impact * Exploitability metric.

66
New cards

Accept Risk

Record and monitor risk without action.

67
New cards

Avoid Risk

Change practices to eliminate risk factors.

68
New cards

Mitigate Risk

Collaborate to reduce likelihood or impact.

69
New cards

Share Risk

Agree to share risk impact with others.

70
New cards

Transfer Risk

Use instruments to cover potential losses.

71
New cards

Symmetric Cipher

Same key for encryption and decryption.

72
New cards

Asymmetric Cipher

Uses two mathematically related keys for encryption.

73
New cards

Hash Function

Irreversibly converts input to fixed-length output.

74
New cards

One-way Cryptography

Irreversible encryption, often using hash functions.

75
New cards

Digital Identity Management

Validates online entities before access control.

76
New cards

Key Space

The total number of possible keys in cryptography.

77
New cards

Cipher Strength

Measure of encryption algorithm's security level.

78
New cards

Classical Primitives

Basic encryption methods: transposition and substitution.

79
New cards

Digital Primitives

Modern encryption methods: block and stream ciphers.

80
New cards

Key Architecture

Structure of keys: symmetric vs asymmetric.

81
New cards

Two-way Encryption

Allows both encryption and decryption processes.

82
New cards

Mode of Encryption

Specific methods used in symmetric ciphers.

83
New cards

Examples of Symmetric Ciphers

Includes RC4, DES, AES for encryption.

84
New cards

Examples of Asymmetric Ciphers

Includes RSA, Diffie-Hellman for secure key exchange.

85
New cards

Identification

Recognizing an entity's identity in a system.

86
New cards

Authentication

Verifying an entity's claimed identity.

87
New cards

Authorisation

Granting access rights to authenticated users.

88
New cards

Accounting

Tracking user activity within a system.

89
New cards

Credential

A proof of identity for access.

90
New cards

Secret

Confidential information known only to the user.

91
New cards

Role

A set of permissions assigned to a user.

92
New cards

Log

Record of user activities and events.

93
New cards

Identity factors

Elements used to verify an individual's identity.

94
New cards

Something you know

Knowledge-based factor like passwords or PINs.

95
New cards

Something you have

Possession-based factor like smart cards.

96
New cards

Something you are

Biometric factor like fingerprints or facial recognition.

97
New cards

Data lifecycle

Stages data goes through from creation to destruction.

98
New cards

Data Creation

Initial collection or acquisition of data.

99
New cards

Data Management

Processes for storing and securing data.

100
New cards

Data Consumption

Using or processing data for various purposes.