PRELIM QUIZ COMPILATION Flashcards
MODULE 4
Its objective is to prevent cyber threats.
- Network Security
MODULE 4
A components of Network Security that Controls the incoming and outgoing network traffic.
- Firewalls
MODULE 4
A components of Network Security that Detects and removes malicious software In your device.
– Antivirus and anti-malware
MODULE 4
A republic act that enacted to protects the personal information.
– RA 10173
MODULE 4
A republic act that addresses the crime committed using digital technology.
– RA 10175
MODULE 4
It’s a network security threats that means there’s someone that Intercepting communication.
–Man in the middle
MODULE 4
A components of Network Security that we used to secure remote access.
–VPN
MODULE 4
It’s a principle of secure network design that used to layered security approach.
– Defense in Depth
MODULE 4
It’s a principle of secure network design that means Continuous verification and authentication.
– Zero Trust Model
MODULE 4
Make a one sentence on what have you learned for today’s topic?
MODULE 3
______________ involves identifying potential hazards, evaluating the likelihood and impact of those hazards, and determining the necessary actions to reduce or eliminate risks.
– Risk Assessment
MODULE 3
It’s a type of data that can be type and need a smaller size storage.
– Structured data
MODULE 3
It’s a type of data that needs a bigger size of storage.
–Unstructured data
MODULE 3
____________ refers to the framework, policies, and processes established to ensure the organization’s security objectives align with business goals.
– Information Security Governance
MODULE 3
Conclusion
GOOD GOVERNANCE IS THE FOUNDATION OF A SECURE FUTURE
MODULE 2
It’s one of the risk mitigation strategies that means taking action before something happens.
Proactive Measures
MODULE 2
It’s one of the risk mitigation strategies that means responding to something after it happens.
Reactive Measures
MODULE 2
is the process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events.
Risk Management
MODULE 2
Key Elements of Risk Management
Risk Identification, Risk Assessment, Risk Mitigation, Risk monitoring and review
MODULE 2
is a set of rules and guidelines that govern how an organization protects its assets, data, and systems from unauthorized access or attacks.
Security Policies
MODULE 2
Standard for securing credit card information
PCI-DSS
MODULE 2
International standard for information security management.
ISO/IEC 27001
MODULE 2
Sets requirements for the protection of health information in the U.S.
HIPAA
MODULE 2
Give 4 types of risk in an organization.
Operational risk, Financial risk, Reputational risk, Compliance risk, Cybersecurity risk
MODULE 1
________ refers to the protection of digital devices, networks, systems, and data from unauthorized access, damage, or theft.
TECHNOLOGY SECURITY
Key Threats in Technology Security
- MALWARE
- PHISHING
- INSIDER THREATS
- DOS ATTACKS
- ZERO-DAY EXPLOITS
BASIC PRINCIPLES OF SECURITY
- CONFIDENTIALITY
- INTEGRITY
- AVAILABILITY
- AUTHENTICATION
- NON-REPUDIATION
BEST PRACTICES FOR INDIVIDUALS
- USE STRONG PASSWORDS
- ENABLE 2FA
- BE CAUTIOUS WITH EMAILS
- REGULARLY UPDATE SOFTWARE
- BACK UP DATA
FUTURE TRENDS IN TECHNOLOGY SECURITY
- Artificial Intelligence in Cybersecurity
- Quantum Computing
- Increased IoT Security
- Biometric Authentication
- Zero-Trust Architecture