This class was created by Brainscape user Elliot Minns. Visit their profile to learn more about the creator.

Decks in this class (15)

1a - Understanding how internal threats occur
What is end point security,
What helps mitigate employee theft,
Some examples of employee sabotage
10  cards
1b - How External Threats Function
List the types of malware,
What does spyware do,
What does adware do
19  cards
2a - The Impact of Threats
Define operational loss,
Define financial loss,
Define reputational loss
8  cards
2b - Understanding system vulnerabilities 1
What is iptables firewall,
Describe the differences between ...,
Features of hardware firewalls
11  cards
3a - Understanding system vulnerabilities 2
Define oem,
How can os updates cause system v...,
Why is ios seen as more secure th...
11  cards
3b - Understanding legal responsibilities 1
What year is the data protection ...,
What is the purpose of the gdpr,
Who is the ico
11  cards
4a - Understanding legal responsibilities 2
What year was the telecommunicati...,
What does the telecommunications ...,
What laws must a business respect...
8  cards
4b - Physical Security
Nam some site security measures,
What is meant by cra,
Why are biometric and card locks ...
9  cards
5a - AV, Firewalls, and NAT
What is av real time protection,
Define signature detection,
Define heuristic detection
9  cards
5b - User Authentication
List forms of user authentication,
How do graphical passwords work,
What is mfa
7  cards
Preparing for the activities
What will help identify the risk ...,
When explaining the risks it shou...,
How many threats should be addres...
13  cards
6a - Encryption
Applications of encryption,
What is data at rest,
What is data in transit
9  cards
6b - Further hardware/software measures
What is principle of least privilege,
What is a network audit,
What is trusted computing
8  cards
7a - Types of networks
List the types of networks,
List the,
What is an extranet
3  cards
7b - Topologies and Architecture
List topology architectures,
What is a physical topology,
What is a logical topology
5  cards

More about
Cyber Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Elliot Minns's Cyber Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 9 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
Cyber Security
  • 12 decks
  • 249 flashcards
  • 2 learners
Decks: Practice Test 1, Social Engineering, Malware, And more!
IT Cybersecurity
  • 14 decks
  • 443 flashcards
  • 71 learners
Decks: A It Essentials Quiz 1, A It Essentials Quiz 2, A It Essentials Quiz 3, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards