01a. Information Security Technologies Flashcards
Information Security Technologies
Information security utilizes its own portfolio of protective and detective technologies in its function to protect “all things IT”
- Foundation technologies
- Endpoint protection
- Network Protection
- Data Protection
- Identity and Access Management
- Event Management
- Vulnerability Management
- Systems and Software Development
- Governance, Risk and Compliance
202
Foundation technologies
Foundation technologies include…
- TCP/IP
- Operating Systems Internals
- Middleware
- Applications and Tools
201
Endpoint protection
Endpoint protection includes…
- Antimalware
- Firewalls
- Patch and Configuration Management
- Host-based Intrusion Detection Systems (HIDSs)
- Mobile DEvice Management (MDM)
- Mobile Application Management (MAM)
- Secure Access Service Edge (SASE)
202
Network Protection
Network Protection includes…
- Antimalware
- Firewalls
- Patch and Configuration Management
- Intrusion Detection Systems (IDS/NIDS)
- Intrusion Provention Systems (IPS)
- Web Content Filtering
- Cloud Access Security Brokers (CASBs)
- Spam and Phishing Filtering
- Remote Access and Virtual Private Networks (VPNs)
202
Data Protection
Data Protection includes…
- Data Loss Prevention (DLP)
- Backup, replication, Snapshots, and Vaulting
- Removable Storage Monitoring and Management
- Encryption and Digital Signatures
- Fingerprinting, Tagging, and Watermarking
202
Identity and Access Management
Identity and Access Management includes…
- Passowrd Vaults
- Privileged Access Gateways
- Multifactor Authentication (MFA)
- Federated Identity (OAuth, FIDO Alliance)
202
Event Management
Event Management includes…
- Centralised Logging
- Security Information and Event Management (SIEM)
- Threat Intelligence Platforms (TIPs)
- Security Orchestration, Automation, and Response (SOAR)
202
Vulnerability Management
Vulnerability Management includes…
- Security Scanning
- Penetration Testing
- Social Engineering Testing
202
Systems and Software Development
Systems and Software Development includes…
- Dynamic Application Security Testing (DAST)
- Static Application Security Testing (SAST)
- Penetration Testing
- Code Review
202
Governance, Risk and Compliance
Governance, Risk and Compliance includes…
- Governance, Risk and Compliance (GRC) platforms
- Integrated Risk Management (IRM) platform
202