Chapter 5 Flashcards

1
Q

It involves the proactive measures taken to safeguard computer systems, networks, and digital data from unauthorized access, theft, or harm.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is all about protecting the digital aspects of our lives

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enumerate cybersecurity issues (5)

A

Information Security:
Network Security
Application Security
Endpoint Security
Cloud Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This involves safeguarding data, such as personal information, business secrets, and financial records, from unauthorized access, disclosure, and alteration

A

Information Security:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In Information Security, ___ and ___ are common methods used to protect information

A

Encryption, access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2 types of encryption

A

Asymmetric and symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

focuses on protecting the integrity and availability of computer networks.

A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Network security, tools and techniques used to
secure network. What are those?

A

Firewalls,
virtual private networks (VPNs)
intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

involves securing software applications and systems to prevent vulnerabilities that could be exploited by attackers.

A

Application security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application Security includes ___ and___ as ways to secure it.

A

secure coding practices
regular software patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is concerned with protecting
individual devices (e.g., smartphones) computers, from security
threats.

A

Endpoint security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are commonly used in Endpoint security (3)

A

Antivirus software
endpoint detection and response (EDR) solutions
mobile device management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

focuses on protecting data and services hosted in cloud environments.

A

Cloud security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud security includes measures like ___,
____, and ____ to ensure the security of cloud-based resources.

A

access controls
encryption
monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the practice of managing user identities and controlling their access to systems and data.

A

Identity and Access Management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IAM involves ___, ___, and _____.

A

authentication
authorization
access control mechanisms

17
Q

Educating employees and users about security best practices is essential in preventing security breaches.

A

Security Awareness and Training

18
Q

The clever manipulation of the natural human tendency to trust

A

Social engineering

19
Q

Many industries and jurisdictions have
specific regulations and cybersecurity compliance
requirements that organizations must adhere to.

A

Compliance and Regulation

20
Q

This includes standards like GDPR in Europe and HIPAA in the healthcare industry

A

Compliance and Regulation