Introduction to and Overview of Cybersecurity (Video)

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

flashcard set

Earn XP

Description and Tags

Vocabulary-style flashcards covering key terms and concepts from the cybersecurity lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Cyberspace

The notional environment where communication over computer networks occurs; an operational domain framed by electronics and the electromagnetic spectrum to create, store, modify, exchange, and exploit information via interconnected information systems.

2
New cards

Cybersecurity

The protection of computer systems from theft or damage to hardware, software, or information, and from disruption or misdirection of the services they provide.

3
New cards

CIA Triad

The three core security goals: Confidentiality, Integrity, and Availability.

4
New cards

Confidentiality

Protecting information from disclosure to unauthorized entities.

5
New cards

Integrity

Ensuring information is not altered accidentally or by unauthorized entities.

6
New cards

Availability

Ensuring information and services are accessible when needed.

7
New cards

Threat

The potential for an event that could cause an undesirable effect on an asset, evaluated with respect to the CIA triad.

8
New cards

Safeguard

A control or measure designed to reduce the risk posed by a threat.

9
New cards

Vulnerability

A weakness or gap in safeguards that allows a threat to cause harm to an asset.

10
New cards

Exploit

A technique that takes advantage of a vulnerability to achieve an effect on an asset.

11
New cards

Asset

Information, software, hardware, and bandwidth; also intangible assets like reputation, privacy, or money.

12
New cards

Risk

The potential for loss or undesired effects on an asset, often assessed relative to threats, safeguards, and the CIA triad.

13
New cards

Cost-Benefit Principle

Do not devote more resources than the potential loss; weigh cost of loss against cost of prevention and consider secondary costs.

14
New cards

Attack Phases (Five P’s)

Probe, Penetrate, Persist, Propagate, Profit—the sequential stages of an attack.

15
New cards

Denial of Service (DoS)

An attack aimed at overwhelming resources to prevent legitimate use of services.

16
New cards

Defensible Systems

Systems designed to be harder to attack and easier to defend, built around four elements: Controlled, Minimized, Monitored, Current.

17
New cards

Controlled

Element of defensible systems focusing on accountability, authentication, access controls, and related concepts (MAC/DAC/RBAC, physical security).

18
New cards

Minimized

Reduce attack surface by removing unnecessary services, software, accounts, and hardware; enforce least privilege.

19
New cards

Monitored

Logging and auditing to detect and respond to security events; includes antivirus/IDS and file integrity monitoring.

20
New cards

Current

Keeping software and systems patched and up to date from trusted sources; includes backups.

21
New cards

Access Control

Mechanisms that regulate who or what can access data, executables, and hardware; involves subjects, objects, ACLs, and kernel enforcement.

22
New cards

MAC (Mandatory Access Control)

Access decisions based on fixed policy and levels of clearance, often with multi-level security.

23
New cards

DAC (Discretionary Access Control)

Access decisions controlled by the owner of the resource.

24
New cards

RBAC (Role-Based Access Control)

Access based on user roles rather than individual identity alone.

25
New cards

Authentication

Verifying the identity of a user, process, or device before permitting access.

26
New cards

Something You Know

A knowledge factor in authentication, such as a password or passphrase.

27
New cards

Something You Have

A possession factor in authentication, such as a token or smart card.

28
New cards

Something You Are

A biometric factor in authentication, such as a fingerprint or iris scan.

29
New cards

Password Security

Best practices for passwords: complexity, passphrases, mandatory changes, lockouts, hashing and salts, and protection against attacks.

30
New cards

Least Privilege

Giving users only the minimum privileges necessary to perform their jobs.

31
New cards

Logging and Auditing

Recording user activities and system events to support troubleshooting and security monitoring.

32
New cards

Patch Management

Keeping operating systems, services, applications, and drivers up to date with security patches from trusted sources.

33
New cards

Encryption

Encoding information to protect confidentiality, often used on networks and stored data.

34
New cards

Digital Signatures

Cryptographic signatures that verify data integrity and authenticity.

35
New cards

Firewall

A security device or software that filters network traffic according to policy to block threats and control access.

36
New cards

Physical Security

Protection of hardware and facilities from physical tampering or damage.