Week 1 - Intro to Security Flashcards
What is Cyber Security?
security of any device connected to a network
What is Information Security?
the security of any information
What is Computer Security?
security of any computing device
What are the three stages of cyber security process?
Prevent, Detect and Respond to attacks
How to approach Cyber security?
through Risk Management
- Identify assets
- Determine Potential Risks
- Determine mitigation techniques to implement
What is the CIA triad?
- Availability - data available to authorised users
- Confidentiality - data kept private
- Integrity - data kept correct
What is a Bad actor or Threat actor?
A user trying to gain unauthorised access
What is a malicious and non-malicious actor?
Malicious - Somone with intent to cause harm
Non-Malicious - Someone unintentionally compromises the system
What are vulnerabilities, threats, and attacks?
Vulnerability - limitations that compromises a system
Threat - someone/something that poses a threat to data
Attack - an attempt to harm the system
What is an attack surface and attack vector?
Attack surface - All points of entry are exploited
Attack Vector - a Specific path is exploited
three UK laws related to cybersecurity
Computer Misuse Act 1990
Serious Crime Act 2015
Data Protection Act 2018
Why is security an iterative process?
Requires continuous monitoring and updates to adapt to new threats and vulnerabilities.