Cybersecurity Flashcards
(10 cards)
What is EDR and why does it matter?
EDR continuously monitors devices (laptops, servers) to detect and respond to threats.
Highlights fast response and device-level protection. Helps buyers who care about remote or hybrid teams.
What does Zero Trust mean in cybersecurity?
No one is trusted by default—every user or device must be verified continuously.
Use when the buyer wants to reduce insider threats or tighten access control without killing productivity.
How does MFA help secure access?
MFA adds a second step (like a code or fingerprint) beyond just a password.
Great for entry-level security upgrades. Reduces common breaches from stolen passwords.
What is a SIEM used for?
It collects and analyzes data from across systems to detect suspicious activity.
Emphasize visibility across the tech stack—ideal for buyers overwhelmed by alerts and data noise.
What does IAM control?
IAM manages who can access what, and under what conditions.
Crucial for role-based access and compliance. Use if buyer wants centralized control over user permissions.
Why is privilege escalation a risk?
It’s when an attacker gains higher access rights than they should have.
Use this to show how your product limits damage if a breach happens.
What does vulnerability scanning do?
It scans systems for weaknesses before attackers can exploit them.
Talk about staying ahead of risks. Often tied to compliance and proactive security.
What is an incident response workflow?
It’s a plan or process a company follows after a security event.
Appeals to buyers who want to reduce downtime and act fast under pressure.
Why is encryption important?
It scrambles data so that only authorized parties can read it.
Helps in industries with sensitive data (healthcare, finance). Key for data privacy and compliance.
What is lateral movement in a cyberattack?
It’s when attackers move from one system to another inside a network.
Focuses on breach containment. Use this if your product catches subtle internal threats.