Cyber Protection Flashcards

1
Q

It combines the benefits of data protection and cybersecurity needed for business operations in the current cyber threat landscape

A

Cyber Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scopes of Cyber Protection:

A
  • Safety
  • Accessibility
  • Privacy
  • Authenticity
  • Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This deals with ensuring that a reliable copy of data and information is always available. It will be a backup whenever the original copy gets corrupted or compromised due to cyber attacks. Time would not be wasted restoring and recovering the data if a reliable copy is available.

A

Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This deals with ensuring that data and information are available from any location at any time.

Storing valuable data and information to various mediums ensures safety and accessibility whenever a copy gets corrupter or compromised.

it is ideal to put copies on various physical devices and cloud storage for faster accessibility

A

Accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This deals with ensuring full control and transparency over who can view and access the data and information.

As data and information get easily replicated, monitoring the people who can access and view the files is vital to prevent an insider attack.

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It deals with ensuring taht back-up data and information is an exact and umodified copy of the original data.

Doing this avoids the risk of fowarding or disseminating wrong information through different networks that could jeopardize the whole operation.

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It deals with ensuring that data, information, apps, and systems are protected against cyber threats. It all comes down to security regarding ensuring the safety of confidential files, so it is best to monitor whever and whomever the data is passed along.

Another form of security is installing antivirus software to prevent cyber-attacks and malware from affecting the files and the whole system.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly