This class was created by Brainscape user James Lewton. Visit their profile to learn more about the creator.

Decks in this class (17)

Cyber Security Terminology
What is cyber security,
What is the difference between an...,
What are the 3 pillars of the cia...
8  cards
Assets, Vulnerabilities, Threats and Attacks
What is an asset,
What is a critical asset,
What is a tangible asset
18  cards
Cyber Risk Management Basics & The Human Element
What is risk,
What s the difference between per...,
How do you quantify risk
19  cards
Mitigation Basics, Patches & Intro into Insider Threats
What are the 6 categories of secu...,
What are the four considerations ...,
Other than hardware software and ...
13  cards
System Security Overview
What is non repudiation,
What is a system,
What are the six components of an...
13  cards
Extras
What is the difference between sy...,
What is the difference between a ...,
Notation for describing messages ...
7  cards
Cryptography Fundamentals & Symmetric Cryptography
What is cryptography,
What is asymmetric cryptography,
How does a digital certificate work
20  cards
Asymmetric Cryptography Principles
What is the diffie hellman dh key...,
What are the diffie hellman dh ke...,
What are the 4 security levels ca...
9  cards
Cryptographic Attacks
What is a monoalphabetic substitu...,
What is a poly alphabetical subst...,
What are the four components of a...
22  cards
Authentication, Authorisation & Accounting
What are the key defences managed...,
What are the key defences managed...,
What is mandatory access control mac
12  cards
Application Security Fundamentals
What is application security,
Why is application security impor...,
What is the difference between de...
21  cards
OS Security
What are the four types of operat...,
What are the saltzer and schroede...,
What are the revised security pri...
7  cards
Network Security Fundamentals
What are the layers in the cisco ...,
What are the stages in the tcp ip...,
What are the layers in the osi model
29  cards
Endpoint Security
What are the three stages to desk...,
What are the risks associated wit...,
What are three examples of malwar...
9  cards
Digital Forensic Fundamentals
What is digital forensics,
What is locard s principle,
What are the two fundamental ques...
26  cards
The Human Element Pt.2 & Email Security
What are the three elements of us...,
Under what circumstances is secur...,
What are the two most important s...
13  cards
Security Operations
What are the two areas of people ...,
What are the risks of each stage ...
2  cards

More about
Cybersecurity Fundamentals

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study James Lewton's Cybersecurity Fundamentals flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 19 decks
  • 2726 flashcards
  • 84 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
Cybersecurity
  • 73 decks
  • 1324 flashcards
  • 490 learners
Decks: Threat Model, First Look Into Computer Parts And Tools, Computer Parts And Tools Part 2, And more!
Fundamentals
  • 66 decks
  • 1599 flashcards
  • 150 learners
Decks: Patient Interviewing, Pathology Week 1, Microbiology Week 1, And more!
Make Flashcards