cyber Flashcards
What is the primary concern of cybersecurity?
Protecting systems, networks, and programs from digital attacks.
What does the CIA Triad stand for in cybersecurity?
Confidentiality, Integrity, Availability.
What is meant by ‘confidentiality’ in cybersecurity?
Ensuring that data is not disclosed to unauthorized parties using methods like encryption, access control, and authentication.
How is ‘integrity’ maintained in cybersecurity?
By ensuring data is accurate and unaltered using intrusion detection systems and hashing.
What does ‘availability’ imply in the context of cybersecurity?
Ensuring data and resources are available to users when needed, including redundancy and DDoS prevention.
What is the purpose of an Enterprise Information Security Program Policy (EISP)?
Establishes the overall security direction aligned with organizational objectives.
What do Issue-Specific Security Policies (ISSP) address?
Specific issues like internet use, email policies, and incident response.
What guidelines do System-Specific Security Policies (SSSP) provide?
Guidelines for specific systems and technologies like intrusion detection systems and firewalls.
What is the main function of cryptography in cybersecurity?
Maintaining confidentiality and integrity of data through techniques like hashing and encrypting.
Define ‘symmetric cryptography’.
Uses the same key for both encryption and decryption.
What is ‘asymmetric cryptography’?
Uses a public key for encryption and a private key for decryption, enhancing security for key distribution.
What is the purpose of risk assessment in cybersecurity?
To prioritize mitigation efforts by assessing the likelihood and impact of potential incidents.
What is Annualized Loss Expectancy (ALE) in risk assessment?
A calculation used to estimate the expected monetary loss per year from an incident, calculated as Single Loss Expectancy (SLE) multiplied by the Annualized Rate of Occurrence (ARO).
What does TCP/IP stand for and what is its role in network security?
Transmission Control Protocol/Internet Protocol; it defines how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed, and received at the destination.
What is the purpose of TLS in networking?
Transport Layer Security provides confidentiality, integrity, and authentication between application processes.