05 assets, threats, and vulnerabilities

This class was created by Brainscape user Amreek Paul. Visit their profile to learn more about the creator.

Decks in this class (50)

MD1 Understand risks, threats, and vulnerabilities
No deck description has yet been added by the author.
11  cards
MD1 Common classification requirements
No deck description has yet been added by the author.
9  cards
MD1 Digital and Physical Assets: Assets in a digital world
No deck description has yet been added by the author.
5  cards
MD1 The emergence of cloud security
No deck description has yet been added by the author.
8  cards
MD1 Risk and asset security: Elements of a security plan
No deck description has yet been added by the author.
4  cards
MD1: The NIST Cybersecurity Framework
No deck description has yet been added by the author.
6  cards
MD1 Security guidelines in action
No deck description has yet been added by the author.
7  cards
MD2 Safeguard Information: Security Controls
No deck description has yet been added by the author.
8  cards
MD2 Principle of least privilege
No deck description has yet been added by the author.
9  cards
MD2 The data lifecycle
No deck description has yet been added by the author.
3  cards
MD2 Information privacy: Regulations and compliance
No deck description has yet been added by the author.
6  cards
MD2 Encryption methods: Fundamentals of cryptography
No deck description has yet been added by the author.
4  cards
MD2 Public key infrastructure
No deck description has yet been added by the author.
7  cards
MD2 Symmetric and asymmetric encryption
No deck description has yet been added by the author.
15  cards
MD2 Lab: Decrypt an encrypted message
No deck description has yet been added by the author.
2  cards
MD2 Non-repudiation and hashing
No deck description has yet been added by the author.
4  cards
MD2 The evolution of hash functions
No deck description has yet been added by the author.
10  cards
MD2 Create hash values
No deck description has yet been added by the author.
1  cards
MD2 Access controls and authentication systems
No deck description has yet been added by the author.
11  cards
MD2 The rise of SSO and MFA
No deck description has yet been added by the author.
6  cards
MD2 The mechanisms of authorisation
No deck description has yet been added by the author.
6  cards
MD2 Why we audit user activity
No deck description has yet been added by the author.
7  cards
MD2 Identity and access management
No deck description has yet been added by the author.
15  cards
MD3 Vulnerability management
No deck description has yet been added by the author.
5  cards
MD3 Defence in depth
No deck description has yet been added by the author.
7  cards
MD3 Common vulnerabilities and exposures
No deck description has yet been added by the author.
4  cards
MD3 The OWASP Top 10
No deck description has yet been added by the author.
14  cards
MD3 Open source intelligence
No deck description has yet been added by the author.
3  cards
MD3 Identify System Vulnerabilities: Vulnerability Assessments
No deck description has yet been added by the author.
7  cards
MD3 Approaches to vulnerability scanning
No deck description has yet been added by the author.
6  cards
MD3 The importance of updates
No deck description has yet been added by the author.
6  cards
MD3 Penetration Testing
No deck description has yet been added by the author.
5  cards
MD3 Cyber Attacker Mindset: Protect all entry points
No deck description has yet been added by the author.
7  cards
MD3 Approach cybersecurity with an attacker mindset
No deck description has yet been added by the author.
4  cards
MD3 Types of threat actors
No deck description has yet been added by the author.
8  cards
MD3 Pathway through defences
No deck description has yet been added by the author.
3  cards
MD3 Fortify against brute force attacks
No deck description has yet been added by the author.
7  cards
MD4 Social Engineering: The criminal art of persuasion
No deck description has yet been added by the author.
6  cards
MD4 Social engineering tactics
No deck description has yet been added by the author.
5  cards
MD4 Phishing for information
No deck description has yet been added by the author.
8  cards
MD4 Types of Phishing
No deck description has yet been added by the author.
2  cards
MD4 Malicious Software
No deck description has yet been added by the author.
7  cards
MD4 An introduction to malware
No deck description has yet been added by the author.
11  cards
MD4 The rise of cyrptojacking
No deck description has yet been added by the author.
2  cards
MD4 Web based exploits: Cross-site scripting (XSS)
No deck description has yet been added by the author.
7  cards
MD4 Exploitable gaps in databases
No deck description has yet been added by the author.
4  cards
MD4 Prevent injection attacks
No deck description has yet been added by the author.
8  cards
MD4 Threat Modelling: A proactive approach to security
No deck description has yet been added by the author.
8  cards
MD4 PASTA: The Process for Attack Simulation and Threat Analysis
No deck description has yet been added by the author.
8  cards
MD4 Traits of an effective threat model
No deck description has yet been added by the author.
11  cards

More about
05 assets, threats, and vulnerabilities

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Amreek Paul's 05 Assets, Threats, and Vulnerabilities flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Hunt Evil - Threat Hunting
  • 5 decks
  • 94 flashcards
  • 23 learners
Decks: Normal Windows Processes, Lateral Movement Remote Access, Lateral Movement Remote Execution, And more!
Asset Pricing
  • 8 decks
  • 86 flashcards
  • 1 learners
Decks: Chapter 5, Chapter 6, Chapter 7, And more!
Threats
  • 1 decks
  • 159 flashcards
  • 1 learners
Decks: En Sa Systems, And more!
Make Flashcards