Cybersecurity Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

flashcard set

Earn XP

Description and Tags

Cybersecurity Flashcards for Weeks 2 & 3

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

What are the three types of cybersecurity controls?

Preventive, Detective, and Corrective

2
New cards

What is risk in cybersecurity?

The potential for loss or damage when a threat exploits a vulnerability.

3
New cards

What is the difference between inherent risk and residual risk?

Inherent risk exists before controls; residual risk remains after controls are applied.

4
New cards

What are the four types of compliance documents?

Policies, Standards, Procedures, Guidelines

5
New cards

What is an attack vector?

A path or method used by an attacker to access a target system or data.

6
New cards

What is the purpose of a risk assessment?

To evaluate threats, vulnerabilities, and the potential impact to prioritize mitigation strategies.

7
New cards

What does the concept of 'least privilege' refer to?

Giving users the minimum level of access necessary to perform their jobs.

8
New cards

What is a vulnerability in cybersecurity?

A weakness in design, implementation, or controls that could be exploited by a threat.

9
New cards

What makes insiders particularly dangerous as threat agents?

They often have elevated access and trusted roles, which can be exploited intentionally or accidentally.

10
New cards

Why are automated controls generally preferred?

They are consistent, fast, and not subject to human error or neglect.

11
New cards

What is an exploit in the context of a cyberattack?

A software tool or method used to take advantage of a system vulnerability.

12
New cards

What is an example of a detective control?

Monitoring and reviewing system logs to identify unusual activity.

13
New cards

Why is it important to separate policy from procedure?

Policies guide strategy and intent, while procedures provide actionable steps; mixing them complicates updates and approval.

14
New cards

How do standards support policies?

They specify measurable rules and thresholds to help enforce policy requirements.

15
New cards

What does a cybersecurity policy exception define?

Conditions or processes for deviating from standard policy, often used in education or testing environments.

16
New cards

What is Defense in Depth?

A layered security strategy to protect against failure of any single control.

17
New cards

What does a firewall do?

It enforces boundaries between networks and controls data traffic.

18
New cards

Why is network segmentation important?

It limits the spread of attacks by isolating systems.

19
New cards

What is the OSI model used for?

Understanding how data moves through networks, layer by layer.

20
New cards

What is a VPN and why is it used?

A Virtual Private Network encrypts internet traffic to secure communication over public networks.

21
New cards

What is the difference between a switch and a hub?

A switch sends data only to the intended recipient; a hub broadcasts data to all connected devices.

22
New cards

How do routers contribute to defense in depth?

They direct traffic between network segments and can isolate compromised areas.

23
New cards

How does overlapping redundancy improve security?

It provides multiple different controls that protect the same resource, reducing reliance on any single control.

24
New cards

What is a 'man-in-the-middle' attack?

An attack where the attacker intercepts and potentially alters communications between two parties without their knowledge.

25
New cards

What are router tables used for?

To determine the next network hop for routing data to its destination.

26
New cards

What is the difference between a LAN and a WAN?

LAN connects devices in a small geographic area; WAN connects remote networks over long distances.

27
New cards

What does a firewall's 'deny all' default setting do?

Blocks all traffic unless explicitly allowed by defined rules.

28
New cards

Why is logging important in cybersecurity?

It helps detect, investigate, and respond to incidents by tracking system activity.

29
New cards

How does the OSI model help in cybersecurity?

It helps isolate which layer of the network an issue occurs in, aiding in defense strategy and troubleshooting.

30
New cards

What is NAT (Network Address Translation)?

A method that maps private IP addresses to a public one, enabling multiple devices to share a single IP address and improving security.

31
New cards

What is the CIA Triad in cybersecurity?

Confidentiality, Integrity, Availability.

32
New cards

What are the three states of data?

Data at rest, data in motion, and data in use.

33
New cards

Why is cyber hygiene important?

It helps prevent common vulnerabilities through good security habits.

34
New cards

How does NIST define cybersecurity?

As the prevention of damage to and restoration of computers and electronic systems to ensure availability, integrity, and confidentiality.

35
New cards

What is the primary focus of cybersecurity?

To protect information and systems from unauthorized access, modification, or disruption.

36
New cards

What makes cybersecurity a broad organizational issue?

It involves people, processes, and technology across all departments.

37
New cards

Why is availability a critical component of cybersecurity?

It ensures authorized users have reliable access to information and systems when needed.

38
New cards

What is the difference between information security and cybersecurity?

Information security includes protection of all information assets, digital and non-digital; cybersecurity focuses on digital systems and networks.