Chapter 5 Flashcards
It involves the proactive measures taken to safeguard computer systems, networks, and digital data from unauthorized access, theft, or harm.
Cybersecurity
is all about protecting the digital aspects of our lives
Cybersecurity
Enumerate cybersecurity issues (5)
Information Security:
Network Security
Application Security
Endpoint Security
Cloud Security
This involves safeguarding data, such as personal information, business secrets, and financial records, from unauthorized access, disclosure, and alteration
Information Security:
In Information Security, ___ and ___ are common methods used to protect information
Encryption, access control
2 types of encryption
Asymmetric and symmetric
focuses on protecting the integrity and availability of computer networks.
Network security
In Network security, tools and techniques used to
secure network. What are those?
Firewalls,
virtual private networks (VPNs)
intrusion detection system
involves securing software applications and systems to prevent vulnerabilities that could be exploited by attackers.
Application security
Application Security includes ___ and___ as ways to secure it.
secure coding practices
regular software patching
is concerned with protecting
individual devices (e.g., smartphones) computers, from security
threats.
Endpoint security
What are commonly used in Endpoint security (3)
Antivirus software
endpoint detection and response (EDR) solutions
mobile device management (MDM)
focuses on protecting data and services hosted in cloud environments.
Cloud security
Cloud security includes measures like ___,
____, and ____ to ensure the security of cloud-based resources.
access controls
encryption
monitoring
is the practice of managing user identities and controlling their access to systems and data.
Identity and Access Management (IAM)