Essentials Flashcards

(7 cards)

1
Q

CIA Triad

A

Confidentiality: Ensures that data is only accessible to authorized individuals. Methods include encryption, access controls, and authentication.

Integrity: Ensures data is accurate and unaltered. Achieved through hashing, digital signatures, and checksums.

Availability: Ensures that systems and data are accessible when needed. Methods include redundancy, load balancing, and DDoS protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk Management Principles: Threats, Vulnerabilities, Risks, Controls

A

Threats: Potential events that can cause harm (e.g., malware, insider threats, phishing attacks).

Vulnerabilities: Weaknesses in a system that threats can exploit (e.g., outdated software, misconfigured firewalls).

Risks: The likelihood of a threat exploiting a vulnerability and causing harm.

Controls: Measures to reduce risk (e.g., antivirus software, network segmentation, employee training).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Networking Fundamentals, OSI Model & TCP/IP Protocols, Common Network Attacks, Network Security Tools

A

Common Network Attacks:

DDoS (Distributed Denial of Service): Overloading a target with excessive requests.

MITM (Man-in-the-Middle): Intercepting communication between two parties.

ARP Spoofing: Manipulating ARP tables to redirect network traffic.

Network Security Tools:

Firewalls: Filter incoming/outgoing traffic based on rules.

VPNs: Encrypt network traffic for secure remote access.

IDS/IPS: Intrusion Detection/Prevention Systems monitor and block malicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common Security Tools: SIEM Platforms, Vulnerability Scanning Tools, Endpoint Protection Tools, Packet Analysis Tools

A

SIEM Platforms:

Examples: Splunk, QRadar, ArcSight

Function: Collect, analyze, and correlate security logs for threat detection.

Vulnerability Scanning Tools:

Examples: Nessus, OpenVAS

Function: Identify security weaknesses in systems and applications.

Endpoint Protection Tools:

Examples: CrowdStrike, Carbon Black

Function: Protect endpoints from malware, ransomware, and advanced threats.

Packet Analysis Tools:

Examples: Wireshark

Function: Capture and analyze network traffic to detect anomalies and malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Incident Response and Handling: Incident Response Lifecycle, Log Analysis and Threat Hunting Basics

A

Incident Response Lifecycle:

Preparation: Develop response plans and train personnel.

Identification: Detect and confirm incidents.

Containment: Isolate affected systems to prevent spread.

Eradication: Remove the threat and patch vulnerabilities.

Recovery: Restore affected systems and validate security.

Lessons Learned: Document findings and improve future response strategies.

Log Analysis and Threat Hunting Basics:

Log Analysis: Reviewing security logs to detect suspicious activity.

Threat Hunting: Proactively searching for threats in a network before alerts are triggered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Frameworks and Standards: Common Frameworks, Compliance Standards

A

Common Frameworks:

NIST (National Institute of Standards and Technology): Guidelines for managing cybersecurity risks.

ISO 27001: International standard for information security management systems.

CIS Controls: Best practices for securing IT systems against cyber threats.

Compliance Standards:

GDPR (General Data Protection Regulation): Protects personal data of EU citizens.

HIPAA (Health Insurance Portability and Accountability Act): Protects healthcare-related information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Security (AWS, Azure, GCP): Security Best Practices, Threats to Cloud Environments

A

Security Best Practices:

Use multi-factor authentication (MFA).

Implement least privilege access control.

Enable logging and monitoring for cloud assets.

Threats to Cloud Environments:

Misconfigurations: Improper settings exposing sensitive data.

Data Breaches: Unauthorized access to cloud-stored information.

Insider Threats: Employees or contractors misusing access to cloud resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly