Cybersecurity Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

flashcard set

Earn XP

Description and Tags

Flashcards based on lecture notes about cybersecurity.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Intrusion Detection System (IDS)

A network monitoring tool that identifies potential threats by analyzing network traffic and system logs; it is passive and logs and alerts administrators.

2
New cards

Network-Based IDS (NIDS)

Monitors entire network traffic in order to detect potential threats.

3
New cards

Host-Based IDS (HIDS)

Monitors specific devices or servers for potential threats.

4
New cards

Intrusion Prevention System (IPS)

A security tool that actively prevents threats by blocking malicious activities; it acts as a gatekeeper inline with network traffic.

5
New cards

Network-Based IPS (NIPS)

Blocks threats within the network.

6
New cards

Host-Based IPS (HIPS)

Protects individual devices from attacks.

7
New cards

Content-Based IPS

Scans data packets for harmful content.

8
New cards

Signature-Based Detection

Compares network traffic against a database of known attack patterns (signatures).

9
New cards

Anomaly-Based Detection

Establishes a baseline of normal network behavior and flags deviations as potential threats.

10
New cards

Behavioral Analysis

Monitors user activity to identify unusual patterns.

11
New cards

Protocol Analysis

Analyzes network protocols to identify unauthorized actions.

12
New cards

Perimeter Security Layer

Protects the network boundary using firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to monitor and control incoming and outgoing traffic.

13
New cards

Firewall

A security device or software that monitors and controls incoming and outgoing network traffic based on predetermined rules and acts as a barrier between a trusted internal network and untrusted external networks.

14
New cards

SIEM (Security Information and Event Management)

A system that collects, analyzes, and correlates log data from multiple sources to identify potential threats and centralizes data for security monitoring and incident response.

15
New cards

Stateful Inspection

Monitors the state of active connections and uses this information to determine which network packets to allow or deny.

16
New cards

Proxy Firewalls

Acts as an intermediary between users and the internet and filters requests based on application-layer protocols.

17
New cards

Next-Generation Firewall (NGFW)

Combines traditional firewall functions with advanced features like deep packet inspection, intrusion prevention, and application control.

18
New cards

Unified Threat Management (UTM)

Combines multiple security functions (firewall, antivirus, intrusion detection) into a single system.

19
New cards

Threat Intelligence Integration

Incorporates external threat data to identify emerging attack patterns.

20
New cards

Automated Incident Response

Executes pre-defined actions in response to specific alerts.

21
New cards

Machine Learning and Behavioral Analysis

Identifies patterns and anomalies that deviate from baseline network activity.

22
New cards

Log Correlation and Data Visualization

Cross-references data from multiple systems to identify complex attack vectors.

23
New cards

Zero-Day Attacks

A cyberattack that exploits a newly discovered vulnerability in software or hardware.

24
New cards

Advanced Persistent Threats (APT)

Sustained attacks where attackers infiltrate a network and remain undetected for extended periods.

25
New cards

Incident response

Refers to the steps taken by an organization to detect, respond to, and recover from security threats or breaches with the objective to minimize damage, reduce recovery time, and prevent future incidents.

26
New cards

Preparation Phase

Establish a strong foundation to handle incidents effectively by developing IRP, assigning roles, implementing security tools and providing regular training.

27
New cards

Detection Phase

Identify and confirm security incidents quickly via Network Monitoring, Log Analysis, User Behavior Analysis or Endpoint Security.

28
New cards

Containment Phase

Isolate the threat to prevent further damage.

29
New cards

Recovery Phase

Restore systems to normal operations securely via Data Restoration, System Reinstallation, Vulnerability Patching, Incident Reporting and Post-Incident Analysis.

30
New cards

Forensic Analysis

Collect and analyze data to trace the origin of the attack using Wireshark or FTK.

31
New cards

Escalation Procedures

Determine when to escalate incidents to senior management or law enforcement.

32
New cards

Communication Plans

Establish guidelines for communicating with stakeholders during and after an incident and include templates for internal notifications and external press releases.

33
New cards

Security training

Helps employees and students learn how to recognize and respond to threats and includes cyberattacks, evacuation plans, safe online behavior, and how to react quickly in an emergency.

34
New cards

Security Drill

A practice run for a real-life emergency or security issue.