Defense in Depth

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:51 AM on 3/13/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

10 Terms

1
New cards

What is the primary goal of the Defense in Depth strategy?

To use multiple layers of security to slow down or prevent cyberattacks if one layer is compromised.

2
New cards

What is the CIA triad in cybersecurity?

  • Confidentiality – Protects sensitive information from unauthorized access.

  • Integrity – Ensures data remains unaltered and accurate.

  • Availability – Ensures data is accessible when needed.

3
New cards

What security principle ensures that only authorized users can access data?

Confidentiality

4
New cards

What are the seven layers of security in Defense in Depth?

  • Physical security (data center access control)

  • Identity & Access Management (IAM) (MFA, role-based access)

  • Perimeter security (firewalls, DDoS protection)

  • Network security (network segmentation, intrusion detection)

  • Compute security (virtual machine hardening, patching)

  • Application security (secure coding, WAFs)

  • Data security (encryption, access controls)

5
New cards

How does integrity protect data in cybersecurity?

Ensures data is accurate and unmodified by unauthorized sources (e.g., using hashing, checksums).

6
New cards

What is an example of availability in cybersecurity?

Ensuring that authorized users can access systems, such as using backup systems, redundancy, and DDoS mitigation.

7
New cards

How does encryption support Defense in Depth?

Encryption ensures data remains confidential by making it unreadable to unauthorized users.

8
New cards

What is network segmentation, and why is it important?

Dividing a network into isolated sections to limit access and reduce the impact of a breach.

9
New cards

What role does multi-factor authentication (MFA) play in Defense in Depth?

Strengthens identity and access security by requiring multiple forms of verification (e.g., password + biometrics).

10
New cards

Why is Defense in Depth important in cloud security?

Cloud environments have shared responsibilities; using multiple layers of security reduces risk and strengthens compliance.

Explore top flashcards

Religious experience
Updated 84d ago
flashcards Flashcards (33)
WORK S
Updated 1052d ago
flashcards Flashcards (88)
apush units 1-2
Updated 641d ago
flashcards Flashcards (67)
week 4 cardiac
Updated 934d ago
flashcards Flashcards (81)
Liên từ
Updated 60d ago
flashcards Flashcards (45)
ch 17
Updated 1013d ago
flashcards Flashcards (24)
comp test 2 vocab
Updated 643d ago
flashcards Flashcards (66)
ALL FLAGSSSSS
Updated 746d ago
flashcards Flashcards (200)
Religious experience
Updated 84d ago
flashcards Flashcards (33)
WORK S
Updated 1052d ago
flashcards Flashcards (88)
apush units 1-2
Updated 641d ago
flashcards Flashcards (67)
week 4 cardiac
Updated 934d ago
flashcards Flashcards (81)
Liên từ
Updated 60d ago
flashcards Flashcards (45)
ch 17
Updated 1013d ago
flashcards Flashcards (24)
comp test 2 vocab
Updated 643d ago
flashcards Flashcards (66)
ALL FLAGSSSSS
Updated 746d ago
flashcards Flashcards (200)