This class was created by Brainscape user Aiden Beck. Visit their profile to learn more about the creator.

Decks in this class (19)

Risk Management
What are the four possible outcom...,
What are four responses to risks,
Are people good at assessing risk...
4  cards
Internet Of Things
What is fog computing and what ar...,
What is the internet of things,
What are the four generations of ...
5  cards
Pen Testing
What are six tools available in k...,
What is penetration testing and w...,
What are the six stages of pen te...
4  cards
Access Control
Explain what mac is and who usual...,
What is dac can permissions be pa...,
What is rbac who uses it and what...
3  cards
Cloud Computing
What are three cloud service models,
How does a hybrid cloud store sen...,
What are the four cloud deploymen...
5  cards
Auditing
Two requirements for auditing,
What are the three types of audit...,
What are three ways to protect au...
3  cards
Security Awareness
What does csirt and what are they...,
Give four major benefits of secur...
2  cards
Authentication
What are the four means of authen...,
What are six authentication secur...,
What are some advantages and disa...
5  cards
Introduction
What is a security policy,
What is cia,
What are four types of attacks
6  cards
Malware
What are six motivations for writ...,
What s a payload,
What s another term for crimeware
12  cards
Web Security
What is cross site scripting xss ...,
Name three consequences of cross ...,
What are two methods of preventin...
3  cards
Protocols
What is ssl what is s http how do...,
What is pem and pgp which cryptos...
2  cards
Operating Systems
How can the risk of attacks on re...,
What s the goal for penetration t...,
Why shouldn t supplied default so...
6  cards
Secure Coding
What are some countermeasures aga...,
What is an sql injection and how ...,
What is buffer overflow and how d...
3  cards
Cryptography
What is salting,
What is des how many bits does it...,
What is asymmetric encryption
5  cards
Network Security
What s the difference between an ...,
What three logical components mak...,
What is an nids how does it work ...
10  cards
Privacy
What are the seven foundational p...,
Privacy,
What is pia and what are it s req...
3  cards
Social Engineering
What are the six types of attacke...,
Describe the biggest practical th...,
What is an apt
3  cards
Wireless Network Security
Give six steps to secure wireless...,
Name six security threats to mobi...
2  cards

More about
Cyber Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Aiden Beck's Cyber Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 9 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
Cyber Security
  • 12 decks
  • 249 flashcards
  • 2 learners
Decks: Practice Test 1, Social Engineering, Malware, And more!
IT Cybersecurity
  • 14 decks
  • 443 flashcards
  • 71 learners
Decks: A It Essentials Quiz 1, A It Essentials Quiz 2, A It Essentials Quiz 3, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards