Cybersecurity Flashcards
(20 cards)
What does the CIA Triad stand for?
Confidentiality, Integrity, Availability
The CIA Triad is a foundational concept in cybersecurity that emphasizes the importance of protecting data.
What is the purpose of encryption in cybersecurity?
Prevent unauthorized data access
Encryption is a method of securing data by converting it into a coded format.
How does hashing contribute to data integrity?
Ensures data remains unaltered
Hashing creates a unique fixed-size string from data, allowing verification of its integrity.
What is redundancy in the context of availability protection?
Keep systems accessible when needed
Redundancy involves having backup systems or components to ensure continuous availability.
What are strong password characteristics?
12+ characters, mixed case, numbers, symbols
Strong passwords help protect against unauthorized access.
What is the maximum password expiration policy recommended?
90-day maximum, 1-day minimum age
Regularly changing passwords reduces the risk of unauthorized access.
What does multi-factor authentication involve?
Something you know + have + are
Multi-factor authentication enhances security by requiring multiple forms of verification.
What is the principle of least privilege?
Minimum permissions needed for job function
This principle limits access rights for users to the bare minimum required.
Describe role-based access control (RBAC).
Permissions assigned by job role
RBAC restricts system access based on the roles of individual users within an organization.
What is mandatory access control (MAC)?
System-enforced by data classification
MAC restricts access to resources based on the classification of the data.
What does a clean desk policy entail?
Secure documents when away from desk
This policy helps protect sensitive information and reduce risks of data breaches.
What is the purpose of a firewall?
Control inbound/outbound network traffic
Firewalls act as a barrier between trusted and untrusted networks.
What does VPN stand for and its function?
Virtual Private Network; secure tunnel over untrusted networks
VPNs encrypt internet traffic to protect user privacy.
What is the function of antivirus software?
Detect and remove malware threats
Antivirus software is essential for protecting systems from malicious software.
What is data loss prevention (DLP)?
Monitor and control data movement
DLP solutions help prevent sensitive data from being lost or misused.
What are the key components of incident response?
- Incident identification
- Containment procedures
- Evidence preservation
- Communication plan
- Recovery procedures
- Lessons learned
A structured approach to managing and mitigating security incidents.
What does the 3-2-1 backup rule entail?
3 copies, 2 media types, 1 offsite
This rule is a best practice for ensuring data redundancy and recovery.
What is the purpose of behavioral analysis in malware prevention?
Detect suspicious program behavior
Behavioral analysis helps identify malware based on its actions rather than signatures.
What is single sign-on (SSO)?
Reduce password fatigue securely
SSO allows users to access multiple applications with one set of credentials.
What does the shared responsibility model refer to in cloud security?
Understand provider vs customer duties
This model clarifies the security responsibilities of both cloud service providers and customers.