Midterms: Cybersecurity Flashcards
- encompasses the strategic implementation of technologies, processes, and best practices designed to protect digital systems, networks, and data from unauthorized access, cyberattacks, and data breaches.
Cybersecurity
- ensures the confidentiality, integrity, and availability of information while mitigating security risks across various domains
Cybersecurity
5 Core Principles of Cybersecurity
- Confidentiality
- Integrity
- Authentication
- Availability
- Incident Response
Core Principle of Cybersecurity:
- Restricting data access to authorized entities to prevent breaches
Confidentiality
Core Principle of Cybersecurity:
- Ensuring data remains accurate and unaltered during transmission and storage.
Integrity
Core Principle of Cybersecurity:
- Verifying user, system, and device identities via methods such as Multi-Factor Authentication (MFA).
Authentification
Core Principle of Cybersecurity:
- Guaranteeing uninterrupted access to digital resources, even during cyber incidents.
Availability
Core Principle of Cybersecurity:
- Detecting, analyzing, and mitigating threats to maintain system resilience.
Incident Response
5 Advanced Security Mechanisms
- Firewalls
- Encryption Protocols
- Security Analytics
- Artificial Intelligence
- Real-time Threat Detection Systems
5 Emerging Threats and Key Challenges
- Phishing Attacks
- Ransomware
- Data Breaches
- DDoS ( Distributed Denial-of-Service) Attacks
- SQL Injection
Emerging Threats and Key Challenges:
- Social engineering tactics that manipulate users into divulging confidential information.
Phishing Attacks
Emerging Threats and Key Challenges:
- Malicious software that encrypts files and demands payment for decryption.
Ransomware
Emerging Threats and Key Challenges:
- Unauthorized access to sensitive data, leading to financial and reputational damage.
Data Breaches
Emerging Threats and Key Challenges:
- Overloading systems with excessive traffic to cause downtime.
DDoS (Distributed Denial-of-Service) Attacks
Emerging Threats and Key Challenges:
- Exploiting database vulnerabilities to extract or manipulate stored information.
SQL Injection