Introduction to Defensive Cybersecurity Flashcards
What is the primary focus of Defensive Cybersecurity?
Proactive strategies to identify, mitigate, and prevent cyber threats.
What three principles are essential in Defensive Cybersecurity?
Confidentiality, integrity, and availability of data and systems.
What is the purpose of risk assessments in Defensive Cybersecurity?
To identify, analyze, and evaluate potential vulnerabilities and prioritize security efforts.
What is threat modeling?
Analyzing potential threats and attack methods to implement effective countermeasures.
What is defense-in-depth?
A strategy involving multiple layers of security controls to minimize vulnerabilities.
What are examples of security controls in defense-in-depth?
Firewalls, intrusion detection systems, secure coding, encryption, and user training.
Why is security awareness training important?
It helps individuals recognize and respond to cyber threats and fosters a culture of cybersecurity.
What are common cyber attack vectors?
Malware, phishing, ransomware, and password attacks.
What are examples of social engineering techniques?
Phishing emails, pretexting, baiting, quid pro quo, and tailgating.
Why is incident response crucial in Defensive Cybersecurity?
It minimizes the impact of security incidents and helps restore normal operations.
What does incident response involve?
Containing the incident, preserving evidence, and communicating with stakeholders.
What are legal considerations in Defensive Cybersecurity?
Compliance with data protection, privacy, and cybersecurity laws and regulations.
What are ethical considerations in Defensive Cybersecurity?
Protecting privacy, respecting intellectual property, and acting in the best interest of stakeholders.