Chapter 5 Flashcards
(20 cards)
It involves the proactive measures taken to safeguard computer systems, networks, and digital data from unauthorized access, theft, or harm.
Cybersecurity
is all about protecting the digital aspects of our lives
Cybersecurity
Enumerate cybersecurity issues (5)
Information Security:
Network Security
Application Security
Endpoint Security
Cloud Security
This involves safeguarding data, such as personal information, business secrets, and financial records, from unauthorized access, disclosure, and alteration
Information Security:
In Information Security, ___ and ___ are common methods used to protect information
Encryption, access control
2 types of encryption
Asymmetric and symmetric
focuses on protecting the integrity and availability of computer networks.
Network security
In Network security, tools and techniques used to
secure network. What are those?
Firewalls,
virtual private networks (VPNs)
intrusion detection system
involves securing software applications and systems to prevent vulnerabilities that could be exploited by attackers.
Application security
Application Security includes ___ and___ as ways to secure it.
secure coding practices
regular software patching
is concerned with protecting
individual devices (e.g., smartphones) computers, from security
threats.
Endpoint security
What are commonly used in Endpoint security (3)
Antivirus software
endpoint detection and response (EDR) solutions
mobile device management (MDM)
focuses on protecting data and services hosted in cloud environments.
Cloud security
Cloud security includes measures like ___,
____, and ____ to ensure the security of cloud-based resources.
access controls
encryption
monitoring
is the practice of managing user identities and controlling their access to systems and data.
Identity and Access Management (IAM)
IAM involves ___, ___, and _____.
authentication
authorization
access control mechanisms
Educating employees and users about security best practices is essential in preventing security breaches.
Security Awareness and Training
The clever manipulation of the natural human tendency to trust
Social engineering
Many industries and jurisdictions have
specific regulations and cybersecurity compliance
requirements that organizations must adhere to.
Compliance and Regulation
This includes standards like GDPR in Europe and HIPAA in the healthcare industry
Compliance and Regulation