What is Cybersecurity? Flashcards

1
Q

Define Cybersecurity

A

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the CIA Triad?

A

A basic, overarching model for Cybersecurity. Stands for:
- Confidentiality
- Integrity
- Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is CONFIDENTIALITY, and what are some examples of how it is managed (CIA Triad)?

A

Confidentiality is the protection of private information and can be managed by:
1) Keeping levels of access and setting permissions
2) Encrypting Data and Files
3) Requiring multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is INTEGRITY and what are some techniques related to integrity? (CIA Triad)

A

Data integrity refers to security controls that protect data from being changed or deleted.
1) Keeping backups of the data in its correct state, and logging versions
2) Using cryptography to securely check for changes
3) Keeping track of digital signatures to prove integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is AVAILABILITY, and how is it accomplished? (CIA Triad)

A

Availability refers to data being consistently, reliably available to those authorized, and is accomplished by:
1) Always monitoring servers and networks
2) Maintaining hardware & software
3) Having a plan for disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the primary domains of Cybersecurity?

A

1) Security Engineering
2) Governance & Compliance
3) Risk Management & Threat Intelligence
4) Security Operations
5) Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the primary components of Security Engineering?

A

1) Information Security
2) Network Security
3) Application Security
4) Cloud Security
5) Cryptography
6) Critical Infrastructure Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Information Security?

A

InfoSec protects data in any form (physical and digital) from being accessed, modified, shared, or deleted by the wrong people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the GDPR? (General Data Protection Regulation)

A

In 2016, the European Parliament and Council agreed on the General Data Protection Regulation. In the spring of 2018, the GDPR began requiring companies to:

1) provide data breach notifications
2) appoint a data-protection officer
3) require user consent for data processing
4) anonymize data for privacy

All companies operating within the EU must comply with these standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Network Security?

A

Network security is concerned with the network infrastructure of an organization that guards against unauthorized access or data from being intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Application Security?

A

Application security refers to implementing measures that defend an application (mobile, desktop, or web) from attack, including both software and hardware solutions.

Examples of application security include secure coding, the use of antivirus programs, firewalls, and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Cloud Security?

A

Cloud security refers to the new field of making sure resources uploaded into the cloud are secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Cryptography?

A

Cryptography focuses on methods to hide and un-hide information so that data is only readable or usable by authorized people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Critical Infrastructure Security?

A

Critical infrastructure security is defending physical systems that are becoming more digital/networked, such as energy grids, hospitals, water and waste systems, and even schools. Among the issues that come up are natural disasters and outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Cybersecurity Governance & Compliance?

A

1) Governance refers to understanding international, federal, and state laws and regulations for security.
2) Compliance refers to making sure an organization enforces certain policies, and continuously auditing as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is Cybersecurity Risk managed?

A

Through identifying risks, assessing the likelihood and potential threat of security vulnerabilities, and finding the most cost-effective and efficient security measures.

17
Q

What is Cybersecurity Threat Intelligence?

A

Threat intelligence is the continuous gathering of knowledge of possible attacks. Intelligence could look like knowing the motivations behind attacks, what the scale of attacks could be, and what vectors that might use. These roles often intersect with data science and machine learning because of the need to process all this information.

18
Q

What is Cybersecurity Security Operations?

A

People who work in this area are responsible for implementing security principles, monitoring for incidents, and recovering from disasters. They work closely with everyone under the security umbrella to:

1) Detect when something has gone wrong.
2) Implement preventative measures against cyber attacks.
3) Make sure there are back-ups in case a system is compromised and data is lost.
4) Track changes to a system.
5) Come up with disaster recovery plans in advance
6) Create documents and organization policies for all of the above.