Concepts Flashcards
(38 cards)
Concept
Breakdown
CIA Triad
Confidentiality, Integrity, Availability
Risk Management
Identify, Assess, Mitigate, Monitor
Access Control Models
MAC, DAC, RBAC, ABAC
Authentication Methods
Something you know, have, are, do, or location
Encryption
Symmetric vs Asymmetric
Firewalls
Packet-filtering, Stateful, Application-layer
IDS/IPS
Intrusion Detection/Prevention Systems
Social Engineering
Phishing, Pretexting, Tailgating, Baiting
Malware Types
Virus, Worm, Trojan, Ransomware, Spyware
Security Controls
Preventive, Detective, Corrective, Deterrent, Recovery
Ports and Protocols
Know common ports and their use
VPN
Secure tunnel between networks
Patch Management
Update software to fix vulnerabilities
Zero Trust
Never trust, always verify
Public Key Infrastructure (PKI)
Manages digital certificates and encryption keys
Multi-Factor Authentication (MFA)
Requires two or more authentication factors
Incident Response
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Symmetric Encryption
One key for both encryption and decryption
Asymmetric Encryption
Uses a public and private key pair
Hashing
Produces a fixed-length string from input data
Security Policies
Guidelines for employee behavior and IT usage
Network Segmentation
Dividing network into zones
SIEM
Security Information and Event Management