Segmentation, Access Control & Mitigation Techniques Flashcards

(10 cards)

1
Q

Segmenting the Network

A

Segmenting the network → security practice that divides a network into smaller, isolated segments to limit lateral movement, reduce attack surface, and contain breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access control list (ACL) → rule set that explicitly allows or denies network traffic based on criteria such as Internet Protocol address, port number, or protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application Allow List/Deny List

A

Application allow list and deny list → security controls that permit only approved applications to run or explicitly block known malicious or unauthorized software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mitigation

A

Mitigation → actions taken to reduce the severity, impact, or likelihood of a security threat or vulnerability rather than eliminating it entirely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Patching

A

Patching → process of applying updates to software or systems to fix vulnerabilities, improve stability, and reduce exposure to known attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

Encryption → security technique that protects data by converting it into unreadable ciphertext, ensuring confidentiality for data at rest and data in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SIEM

A

Security information and event management (SIEM) → Centralized security and event logging software. Detects an helps respond to threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Least Privilege

A

Least privilege → access control principle that grants users and systems only the minimum permissions necessary to perform their required tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Configuration Enforcement

A

Configuration enforcement → posture assessment process that ensures systems remain compliant with approved security baselines and configuration standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Decommissioning

A

Decommissioning → secure process of retiring systems or services by removing access, wiping data, and eliminating unused resources to prevent future exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly