1.0 flashcards

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 62

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

63 Terms

1

Technical Security Controls

Technical:

  • Definition: Hardware or software systems designed to monitor and control security.

  • Examples: Network IDS, biometric security devices, firewalls, antivirus software.

New cards
2

Administrative (Managerial): Security Controls

  • Definition: Policies, procedures, and guidelines for managing security.

  • Examples: Risk identification tools, security awareness training, incident response plans.

New cards
3

Operational Security Controls

  • Definition: Human-centric, focusing on procedures and responsibilities to maintain security.

  • Examples: Cybersecurity training, password policy, disaster recovery planning.

New cards
4

Physical Security Controls

  • Definition: Manages access to premises and hardware, often more expensive than technical controls.

  • Examples: Building access control systems, security cameras, fencing, gates.

New cards
5

Preventative control type

  • Definition: Restricts unauthorized access physically or logically.

  • Examples: System passwords, door locks, firewalls.

New cards
6

Deterrent Control Type

  • Definition: Discourages attacks psychologically.

  • Examples: Warning signs, security cameras.

New cards
7

Detective Control Type

  • Definition: Identifies and records attempted or successful intrusions.

  • Examples: Intrusion detection systems (IDS), security cameras, log monitoring.

New cards
8

Corrective Control Type

  • Definition: Responds to and fixes incidents.

  • Examples: Antivirus software, patch management.

New cards
9

Compensating Control Type

  • Definition: Provides alternative means when primary controls are insufficient.

  • Examples: Temporary firewalls, manual processes.

New cards
10

Directive Control Type

  • Definition: Guides behavior with policies, procedures, and guidelines.

  • Examples: Security policies, compliance regulations.

New cards
11

Confidentialtiy (CIA)

Ensures data is accessible only to authorized personnel.

New cards
12

Integrity (CIA)

Ensures data remains unaltered during storage and transfer.

New cards
13

Availability (CIA)

Guarantees data accessibility.

New cards
14

Non-repudiation

Ensures authenticity of data through mechanisms like digital signatures, code signing, comparing hashes

New cards
15

Authentication

(AAA)

  • Verifies users or systems.

New cards
16
  • Authorization (AAA)

  • Grants appropriate access.

New cards
17
  • Accounting (AAA)

  • Tracks user actions.

New cards
18
  • Hacktivists

  • Definition: Hacktivists are individuals or groups that use hacking techniques to promote political, social, or ideological causes. They often target governments, corporations, or organizations they oppose.
    Example: A hacktivist group defaces a government website to protest internet censorship.

New cards
19

  • nation-states,

refer to governments or state-sponsored groups that conduct cyberattacks for espionage, disruption, or warfare. They have significant resources and advanced hacking capabilities.
Example: A country's intelligence agency hacks another nation's power grid to disrupt its infrastructure.

New cards
20
  • insider threats,

Definition:

come from employees, contractors, or business partners who misuse their access to harm an organization, either intentionally or accidentally.
Example: A disgruntled employee leaks confidential company data to a competitor before quitting.

New cards
21

Organized Crime

Definition: Organized crime groups use hacking for financial gain, often engaging in cyber fraud, identity theft, or ransomware attacks. They operate like businesses but focus on illegal activities.
Example: A cybercrime gang infects a hospital’s network with ransomware and demands payment to restore patient records.

New cards
22

Risk Assessment/Management:

  • Identifying, analyzing, and prioritizing risks to mitigate potential impacts.

New cards
23

Principle of Least Privilege:

  • Providing the minimum level of access necessary.

New cards
24

Security Posture:

  • Overall security readiness of an organization.

New cards
25

Zero Trust:

  • Definition: No implicit trust; continuous verification required.

New cards
26

Adaptive Identity:

  • Definition: Adjusts user access dynamically based on behavior.

New cards
27

Policy-driven Access Control:

  • Definition: Uses policies to maintain security.

New cards
28

Approval Process:

  • Evaluates and authorizes changes.

New cards
29

Ownership

  • Assigns responsibility for overseeing changes.

New cards
30

Stakeholders

  • Individuals/groups affected by changes.

New cards
31

Backout Plan

  • Strategy for reverting to previous system state.

New cards
32

Configuration Management:

  • Tracking and controlling changes in the system.

New cards
33

Version Control:

  • Definition: Managing updates to documents, software, and system settings.

  • Example: A developer tracks changes to code so previous versions can be restored if needed.

New cards
34

Continuous Monitoring

  • Definition: Watching systems for changes to detect security issues.

  • Example: A security team uses software to check for unusual activity on company servers.

New cards
35

Allow/Deny Lists

  • Definition: Lists that control what is allowed or blocked.

  • Example: A company only allows approved websites to be accessed from work computers.

New cards
36

Downtime

Definition: A planned period when a system is unavailable for maintenance.

Example: A bank's website goes offline at midnight for scheduled updates

New cards
37

Service/Application Restart

Definition: Turning an app or system off and on again to apply updates.

Example: After installing security patches, an IT team restarts the company’s email server.

New cards
38

Public Key Infrastructure (PKI)

  • Definition: A system for managing digital certificates to verify identities online.

  • Example: A website uses PKI to provide a secure HTTPS connection.

New cards
39

Public/Private Keys

  • Definition: The public key encrypts data, and the private key decrypts it.

  • Example: When sending an encrypted email, the recipient uses their private key to read it.

New cards
40

Data at Rest:

Encrypts stored data, such as files or databases.

  • Example: A laptop uses full-disk encryption to protect its contents if stolen.

New cards
41

Data in Transit:

Protects data while being transmitted.

  • Example: A VPN encrypts internet traffic to secure browsing.

New cards
42

Symmetric Encryption:

Uses the same key for encryption and decryption

  • Example: Wi-Fi networks use AES encryption to secure connections.

New cards
43

Asymmetric Encryption:

Uses a public key to encrypt and a private key to decrypt.

  • Example: HTTPS websites use asymmetric encryption to protect login details.

New cards
44

Hybrid Encryption:

Uses both symmetric and asymmetric encryption for efficiency.

  • Example: Secure messaging apps use hybrid encryption for speed and security.

New cards
45

Hashing:

Converts data into a fixed-length value to check integrity

  • Example: A website stores passwords as hashed values (SHA-256) instead of plain text.

New cards
46

Digital Signatures:

Verifies the authenticity and integrity of a document.

  • Example: A contract is digitally signed to confirm it hasn’t been altered.

New cards
47

TLS/SSL:

Secures communication between web browsers and servers.

  • Example: Online banking sites use TLS to encrypt user transactions.

transport layer security / secure socket layer

New cards
48

Block vs. Stream Ciphers

  • Definition:

    • Block ciphers encrypt fixed-size chunks of data (e.g., AES).

    • Stream ciphers encrypt data one bit at a time (e.g., RC4).

  • Example: AES (block cipher) is used for file encryption, while RC4 (stream cipher) was used for older wireless security.

New cards
49

Trusted Platform Module (TPM)

  • Example: Laptops use TPM to store BitLocker encryption keys securely.

: A built-in security chip that protects encryption keys.

New cards
50

Hardware Security Module (HSM)

A dedicated device for managing encryption keys.

  • Example: Banks use HSMs to secure ATM transactions.

New cards
51

Quantum Cryptography

  • Definition: Uses quantum mechanics to create ultra-secure encryption.

  • Example: Future networks could use quantum cryptography to prevent hacking.

New cards
52

Perimeter Security

  • Definition: Barriers and patrols that protect a facility’s outer boundaries.

  • Example: A company installs fences and security gates around its office building.

New cards
53

Bollards

  • Definition: Steel or concrete posts that block vehicle access.

  • Example: Bollards are placed in front of a bank entrance to prevent ram-raiding attacks.

New cards
54

Access Control Vestibule (Mantrap)

Definition: A small, enclosed entryway with two interlocking doors to control access.

  • Example: Employees scan their badges to enter the first door, which must close before the second door unlocks.

New cards
55

Video Surveillance (CCTV)

  • Definition: Cameras that monitor and record activity for security purposes.

  • Example: CCTV cameras in a parking lot help security teams spot suspicious behavior.

New cards
56

Lighting

  • Definition: Bright illumination to improve visibility and deter intruders.

  • Example: A warehouse installs floodlights to discourage break-ins at night.

New cards
57

Access Badges

  • Definition: ID cards that grant access to restricted areas.

  • Example: Employees must scan their access badges to enter the data center.

New cards
58

Biometric Systems

  • Definition: Security systems that use fingerprints, iris scans, or facial recognition for authentication.

  • Example: A company uses fingerprint scanners to restrict access to the research lab.

New cards
59

Environmental Controls

  • Definition: Systems that protect against fire, temperature changes, and air quality issues.

  • Example: A data center has fire suppression systems and HVAC units to prevent overheating.

New cards
60

Honeypot

  • Definition: A fake system designed to attract hackers and study their behavior.

  • Example: A company sets up a honeypot that looks like a real database to trick cybercriminals into revealing their attack methods.

New cards
61

Honeynet

  • Definition: A network of honeypots that simulate a real environment to detect and analyze threats.

  • Example: A cybersecurity team deploys a honeynet to monitor large-scale attacks targeting financial systems.

New cards
62

Honeyfile

  • Definition: A fake document designed to look valuable and trigger alerts when accessed.

  • Example: A company creates a fake payroll file with tracking mechanisms to detect unauthorized access.

New cards
63

Honeytoken

  • Definition: A decoy credential or data entry used to detect attackers.

  • Example: A system places fake admin login credentials in logs—if someone tries to use them, an alert is triggered.

New cards

Explore top notes

note Note
studied byStudied by 1 person
74 days ago
4.0(1)
note Note
studied byStudied by 3 people
113 days ago
5.0(1)
note Note
studied byStudied by 1 person
112 days ago
5.0(1)
note Note
studied byStudied by 472 people
781 days ago
4.0(1)
note Note
studied byStudied by 4 people
148 days ago
5.0(1)
note Note
studied byStudied by 53 people
704 days ago
5.0(1)
note Note
studied byStudied by 5 people
288 days ago
5.0(1)
note Note
studied byStudied by 462 people
156 days ago
4.0(2)

Explore top flashcards

flashcards Flashcard (25)
studied byStudied by 45 people
820 days ago
4.0(1)
flashcards Flashcard (69)
studied byStudied by 111 people
344 days ago
5.0(2)
flashcards Flashcard (45)
studied byStudied by 220 people
111 days ago
5.0(1)
flashcards Flashcard (126)
studied byStudied by 4 people
686 days ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 14 people
834 days ago
5.0(2)
flashcards Flashcard (98)
studied byStudied by 237 people
370 days ago
5.0(6)
flashcards Flashcard (62)
studied byStudied by 29 people
917 days ago
4.5(2)
flashcards Flashcard (28)
studied byStudied by 4 people
30 days ago
5.0(1)
robot