Defense in Depth

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

What is the primary goal of the Defense in Depth strategy?

To use multiple layers of security to slow down or prevent cyberattacks if one layer is compromised.

2
New cards

What is the CIA triad in cybersecurity?

  • Confidentiality – Protects sensitive information from unauthorized access.

  • Integrity – Ensures data remains unaltered and accurate.

  • Availability – Ensures data is accessible when needed.

3
New cards

What security principle ensures that only authorized users can access data?

Confidentiality

4
New cards

What are the seven layers of security in Defense in Depth?

  • Physical security (data center access control)

  • Identity & Access Management (IAM) (MFA, role-based access)

  • Perimeter security (firewalls, DDoS protection)

  • Network security (network segmentation, intrusion detection)

  • Compute security (virtual machine hardening, patching)

  • Application security (secure coding, WAFs)

  • Data security (encryption, access controls)

5
New cards

How does integrity protect data in cybersecurity?

Ensures data is accurate and unmodified by unauthorized sources (e.g., using hashing, checksums).

6
New cards

What is an example of availability in cybersecurity?

Ensuring that authorized users can access systems, such as using backup systems, redundancy, and DDoS mitigation.

7
New cards

How does encryption support Defense in Depth?

Encryption ensures data remains confidential by making it unreadable to unauthorized users.

8
New cards

What is network segmentation, and why is it important?

Dividing a network into isolated sections to limit access and reduce the impact of a breach.

9
New cards

What role does multi-factor authentication (MFA) play in Defense in Depth?

Strengthens identity and access security by requiring multiple forms of verification (e.g., password + biometrics).

10
New cards

Why is Defense in Depth important in cloud security?

Cloud environments have shared responsibilities; using multiple layers of security reduces risk and strengthens compliance.