1/128
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybersecurity
Protection of computer systems from theft or damage.
Malware
Malicious software designed to harm or exploit systems.
Application Security
Measures to protect applications from threats.
Network Security
Protection of networks from unauthorized access.
Threats
Potential causes of unwanted incidents affecting security.
Vulnerabilities
Weaknesses that can be exploited by threats.
Risks
Potential for loss or damage when threats exploit vulnerabilities.
CIA Triad
Confidentiality, Integrity, Availability in information security.
Confidentiality
Ensuring information is not disclosed to unauthorized users.
Integrity
Maintaining accuracy and trustworthiness of data.
Availability
Ensuring authorized users have access to information.
Secure by Design
Principles ensuring security is integrated from the start.
Least Privilege
Users granted only necessary access rights.
Multiple Layers of Defence
Using various security measures to protect systems.
Complexity in Security
Increased complexity leads to higher security risks.
Incident Response
Processes for managing and mitigating security breaches.
Digital Forensics
Investigating cyber incidents to gather evidence.
Cyber Security Engineer
Professional designing and implementing security systems.
Cyber Security Consultant
Expert advising on security measures and strategies.
Security Architect
Designs security structures for IT systems.
Cyber Security Specialist
Focuses on specific security technologies or practices.
Security Risk & Compliance
Ensures adherence to security regulations and standards.
CompTIA Security+
Certification validating foundational cybersecurity skills.
Vulnerability Analysis
Identifying weaknesses in systems to improve security.
Software execution paradigms
Different methods for running software applications.
Secure development
Practices ensuring software is free from vulnerabilities.
Stack buffer overflow
Exceeding buffer size causing data overwrite on stack.
Virus
Self-replicating malware needing a host file.
Worm
Malware that spreads independently without a host.
Trojan
Malware disguised as legitimate software to deceive users.
Scareware
Malware using fear tactics to extort money.
Bots
Compromised devices forming a network for attacks.
DDoS attack
Distributed denial-of-service attack overwhelming a server.
SYN flood
Attack sending fake SYN requests to exhaust server resources.
Smurf attack
Spoofed ICMP requests causing network-wide echo replies.
Network scopes
Different ranges of network connectivity: LAN, WAN, Internet.
TCP/IP model
Framework for understanding internet communication protocols.
Secure protocols
Protocols ensuring data integrity and confidentiality.
Insecure protocols
Protocols vulnerable to interception and attacks.
Traffic control
Managing data flow using firewalls and IDS/IPS.
Firewalls
Devices filtering incoming and outgoing network traffic.
NAT
Network Address Translation for IP address management.
NIDS/NIDP
Network Intrusion Detection/Prevention Systems monitoring traffic.
Risk Management
Process of identifying and mitigating potential threats.
Threat dimensions
Factors influencing security threats: Agent, Motivation, Location.
Securing assets
Controlling access to protect valuable resources.
Authorized actors
Individuals permitted to access secured assets.
Threat
Potential harm to assets from unauthorized access.
Asset
Resource of value that requires protection.
Vulnerability
Weakness that can be exploited by threats.
Risk
Possibility of loss or harm occurring.
Information risk
Likelihood and impact of harm to information assets.
Likelihood
Probability of a threat exploiting a vulnerability.
Impact
Consequences of a threat materializing.
Enterprise risk management
Process of identifying and mitigating risks.
Identify
Determine existing risks in an organization.
Analyse
Assess severity and consequences of identified risks.
Treat
Decide on strategies to handle identified risks.
Monitor
Track changes in risk over time.
Report
Document and communicate risk management findings.
Quantitative Risk Assessment
Mathematical calculation of risk likelihood and impact.
Qualitative Risk Assessment
Assessment based on perceptions and predefined scales.
Annual Loss Expectancy (ALE)
Expected yearly loss calculated as SLE x ARO.
Risk Matrix
Combines impact and likelihood values for risk assessment.
Risk Calculation
Risk = Impact * Exploitability metric.
Accept Risk
Record and monitor risk without action.
Avoid Risk
Change practices to eliminate risk factors.
Mitigate Risk
Collaborate to reduce likelihood or impact.
Share Risk
Agree to share risk impact with others.
Transfer Risk
Use instruments to cover potential losses.
Symmetric Cipher
Same key for encryption and decryption.
Asymmetric Cipher
Uses two mathematically related keys for encryption.
Hash Function
Irreversibly converts input to fixed-length output.
One-way Cryptography
Irreversible encryption, often using hash functions.
Digital Identity Management
Validates online entities before access control.
Key Space
The total number of possible keys in cryptography.
Cipher Strength
Measure of encryption algorithm's security level.
Classical Primitives
Basic encryption methods: transposition and substitution.
Digital Primitives
Modern encryption methods: block and stream ciphers.
Key Architecture
Structure of keys: symmetric vs asymmetric.
Two-way Encryption
Allows both encryption and decryption processes.
Mode of Encryption
Specific methods used in symmetric ciphers.
Examples of Symmetric Ciphers
Includes RC4, DES, AES for encryption.
Examples of Asymmetric Ciphers
Includes RSA, Diffie-Hellman for secure key exchange.
Identification
Recognizing an entity's identity in a system.
Authentication
Verifying an entity's claimed identity.
Authorisation
Granting access rights to authenticated users.
Accounting
Tracking user activity within a system.
Credential
A proof of identity for access.
Secret
Confidential information known only to the user.
Role
A set of permissions assigned to a user.
Log
Record of user activities and events.
Identity factors
Elements used to verify an individual's identity.
Something you know
Knowledge-based factor like passwords or PINs.
Something you have
Possession-based factor like smart cards.
Something you are
Biometric factor like fingerprints or facial recognition.
Data lifecycle
Stages data goes through from creation to destruction.
Data Creation
Initial collection or acquisition of data.
Data Management
Processes for storing and securing data.
Data Consumption
Using or processing data for various purposes.