Security_Plus_Complete_Guide Flashcards
(199 cards)
What is the CIA triad in cybersecurity?
Confidentiality, Integrity, and Availability.
Define ‘Confidentiality’ in the CIA triad.
Limiting information access to authorized users.
Define ‘Integrity’ in the CIA triad.
Ensuring accuracy and reliability of data.
Define ‘Availability’ in the CIA triad.
Ensuring resources are accessible when needed.
What does AAA stand for in cybersecurity?
Authentication, Authorization, and Accounting.
Describe ‘Authentication’ in AAA.
Verifying identity of a user or device.
Describe ‘Authorization’ in AAA.
Granting permissions to authenticated users.
Describe ‘Accounting’ in AAA.
Tracking user actions for audit purposes.
What is the purpose of the CIA triad?
To provide a foundational model for security policies to protect data.
What is ‘Risk Management’ in cybersecurity?
Identifying, assessing, and mitigating risks to information security.
What is a ‘risk assessment’?
Evaluating potential threats to determine their impact and likelihood.
Define ‘least privilege’ in access control.
Restricting user access to only what is necessary for their role.
What is ‘non-repudiation’ in information security?
Ensuring a user cannot deny having performed an action.
What is a ‘security policy’?
A set of rules and practices that dictate how data is protected.
What is ‘multi-factor authentication’?
Using more than one method of verification to authenticate users.
What is a ‘digital signature’?
An electronic method to verify the authenticity of a document or message.
Explain ‘defense in depth’.
Using multiple layers of security to protect resources.
What does ‘risk tolerance’ mean in risk management?
The level of risk an organization is willing to accept.
Define ‘threat’ in risk management.
Any potential event or action that could cause harm to information.
What is a ‘vulnerability’?
A weakness in a system that could be exploited by a threat.
What is malware?
Malicious software designed to harm or exploit devices, networks, or systems.
Define phishing.
Deceptive attempts to steal sensitive information via email or other forms of communication.
What is ransomware?
Malware that encrypts files and demands payment for their release.
What is a Trojan?
Malware disguised as legitimate software.