Cyber Security 601

This class was created by Brainscape user L PUA. Visit their profile to learn more about the creator.

Decks in this class (118)

Encryption Overview
Encryption,
Digital signature,
Hashing
8  cards
IPSec & TLS/SSL
Ssl tls vpns secure sockets layer...,
Ssl vpn s part 2note ignore as fl...,
What layer do ssl tls vpn s opera...
7  cards
Securing Storage Devices
What is network attached storage ...,
What is a storage area network san,
What kind of drives use hardware ...
7  cards
Endpoint Analysis
What are endpoints,
What are the tools we use to do e...,
What is anti virus av what malwar...
7  cards
Securing Wireless Devices
What are the two wireless connect...,
Wi fi protected access 2 wpa2,
Bluetooth pairing
4  cards
SIM Cloning, ID Theft, & Bluetooth Attacks
Subscriber identity module sim card,
Sim cloning,
What is bluejacking
5  cards
Root of Trust
Hardware root of trust rot,
Hardware security module hsm
2  cards
Trusted Firmware
Why do we use trusted firmware wh...,
Unified extensible firmware inter...,
Secure boot
8  cards
Secure Processing
What is secure processing,
Processor security extensions,
Trusted execution
6  cards
Mobile Device Theft
What are you losing when your dev...,
What options do you have to prote...
2  cards
Security of Mobile Apps
How do you protect your device fr...,
What is mobile device management,
What is geotagging
3  cards
Bring Your Own Device
Why would a company adopt a byod ...,
What are some of the security iss...,
What are solutions to securing by...
6  cards
Hardening Mobile Devices
List 10 ways to harden mobile dev...
1  cards
Hardening
Unnecessary Applications, Restricting Applications
5  cards
Trusted Operating System
Trusted operating system,
Patches hotfix,
Security update
4  cards
Group Policies
What are group policies,
How do you access group policies,
What do group policies enforce
6  cards
File Systems & Hard Drives
What type of file systems are common,
What file systems does windows use,
What is ntfs
5  cards
Supply Chain Assessment
What is the purpose of supply cha...,
What is due diligence,
When conducting your due diligenc...
5  cards
Root of Trust Supply Chain
What is the hardware root of trust
1  cards
Hypervisors
What is a hypervisor,
What is a type 1 hypervisors,
What is a type 2 hypervisor
4  cards
Threats to VM's
What is vm escape,
What are data remnants,
What is privilege elevation
5  cards
Securing VM's
Are the security measures for vm ...,
Can malware in one vm affect the ...,
How should you harden vm s
6  cards
Web Browser Security
What should you do to ensure your...,
Which web browser should you use,
What are the general strategies f...
4  cards
Web Browser Concerns
What are cookies,
What are tracking cookies,
What are session cookies
8  cards
Securing Applications
How can we secure documents,
How do we secure email,
What do user account controls pro...
3  cards
Software Development
What are the seven phases of soft...,
What is the planning and analysis...,
What is the software systems desi...
12  cards
SDLC Principles (Software Development Life Cycle)
What is the cia triad,
What is confidentiality,
What is integrity
15  cards
Testing Methods (Software)
What are the three types of syste...,
What is black box testing,
What is white box testing
9  cards
Vulnerabilities & Exploits
What is a backdoor,
What is the attacker doing during...,
What is arbitrary code execution ...
4  cards
Buffer Overflows
What is a buffer overflow,
What is a buffer,
What is a stack and how is it rel...
5  cards
Cross Site Scripting & Cross Site Request Forgery
What is cross site scripting xxs ...,
What is a stored persistent xxs a...,
What is a reflected xxs attack
7  cards
SQL Injection
What is the sql acronym short for,
What is an sql used for,
What is an sql injection
5  cards
XML Vulnerabilities
What is xml,
What is xml used for,
How do you protect xml data
7  cards
Race Conditions
What is a race condition,
What is dereferencing,
Where can race conditions be used...
3  cards
Design Vulnerabilities
How do design vulnerabilities arise,
What are the three main types of ...,
What are insecure components name...
7  cards
The OSI Model
What does the osi model represent,
Please do not throw sausagepizzaaway,
Layer 1 the physical layer
9  cards
Switches
What types of attacks are switche...,
What is mac flooding,
What is mac spoofing
5  cards
Routers
What layer of the osi model is a ...,
What is a router,
How does a router decide to permi...
4  cards
Network Zones
What are the three network zones,
What is the dmz,
What is an extranet
4  cards
Jumpbox
What is an internet facing host,
Dmz notes,
What is a bastion host
5  cards
Network Access Control
What is nac used for,
What happens if the device fails ...,
What is difference between a pers...
4  cards
VLAN's
What are vlan s implemented for,
What is vlan hopping what are the...,
Explain switch spoofing
4  cards
Subnetting
What is subnetting,
Why is subnetting useful,
How do you increase security via ...
3  cards
Network Address Translation
Ip class a,
Ip class b,
Ip class c
6  cards
Firewalls
What is the primary function of a...,
What are the three types of firewall,
What is a software firewall
14  cards
Proxy Servers
0  cards
Authentication Summary
8021x,
Ldap,
Kerberos
7  cards
Access Control Models
Discretionary access control dac,
Mandatory access control mac,
Rule based access control this is...
6  cards
Best Practices for Access Control
Implicit deny,
Explicit deny,
Least privilege
5  cards
Users and Groups
What should you remember about co...,
What are user rights,
What is a user group
6  cards
Permissions
Folder permissions,
Propagation,
How do you break inheritance for ...
3  cards
Risk Assesment
What is risk assessment in security,
What is risk,
What are vulnerabilities
7  cards
Qualitative and Quantitative Risk
What type of methods are used for...,
What analysis method uses numeric...,
Which method of analysis can calc...
9  cards
Methodologies and Security Controls
What is the purpose of a security...,
Are these assessments required,
What are the two main methodologi...
19  cards
Types of Risk
What is external risk,
What is internal risk,
What is a legacy system risk
6  cards
Vulnerability Management
What does a vulnerability assessm...,
What is the practice of finding v...,
What 3 questions can help scope y...
4  cards
Penetration Testing
How does a vulnerability scan dif...,
What are the 5 steps of a penetra...,
Why do attackers want to pivot to...
4  cards
Training and Exercises
What is a tabletop exercise,
What is a red team,
What is a blue team
4  cards
OVAL
What is open vulnerability and as...
1  cards
Vulnerability Assessment Tools
What are network mapping tools,
What are vulnerability scanning t...,
What is banner grabbing
6  cards
Password Analysis Tools
What is a password analysis tool,
What is another name for password...,
What does the password cracker do
10  cards
Performance Baselining
What exactly is a baseline,
What is baseline reporting,
What is the risk level to which a...
3  cards
Protocol Analyzers
What tool captures and analyzes n...,
What happens in promiscuous mode,
What happens in non promiscuous mode
6  cards
Simple Network Management Protocol (SNMP)
What is snmp,
What are the 3 main components of...,
What are the managed devices
7  cards
Auditing
What is auditing in security,
What type of control is auditing,
What are the two methods of auditing
6  cards
Logging
What are logs,
Where are system logs stored for ...,
What are the 3 types of logs for ...
9  cards
Log Files
What is log file maintenance,
Where should log files be saved,
What is occurring during overwrit...
5  cards
Security Information and Event Management Systems (SIEM)
What is a siem,
What are the 3 ways to implement ...
2  cards
SYSLOG
What is syslog,
What is the name of the standard ...,
What port does syslog use
10  cards
Security Orchestration Automation and Response
What is soar,
What is soar primarily used for,
What is a playbook
4  cards
Symmetric Algorithms
List the 9 symmetric algorithms,
What is the block size of des enc...,
How does 3des encrypt data
10  cards
Asymmetric Algorithms
What are the three asymmetric alg...,
What is diffie hellman best known...,
What is rivest shamir adelman rsa...
4  cards
Pretty Good Privacy
What is special about pgp,
What are the encryption key sizes...,
What is gnu privacy guard gpg
3  cards
One-Time Pad
What is the one time pad stream c...,
What is a psuedo random number ge...
2  cards
Cryptography Considerations
What is a blockchain,
What is a public ledger,
What are ephemeral keys used for
4  cards
Hashing
What is hash value of md5,
What is sha 1 s hash value,
What are the sha 2 and sha 3 hash...
13  cards
Hashing Attacks
What are the two hashing attacks,
What is a pass the hash attack,
What is a birthday attack
7  cards
Public Key Infrastructure
What form of encryption is pki ba...,
Are pki and public key cryptograp...,
Who is the trusted third party in...
3  cards
Digital Certificates
What is a digitally signed electr...,
When referring to a user what doe...,
What standard is used for digital...
14  cards
Certificate Authorities
Who verifies that the user is who...,
Who creates the digital certifica...,
Who act as trusted third parties ...
9  cards
Secure/Multipurpose Internet Mail Extensions (S/MIME)
What standard provides cryptograp...,
How does s mime work,
How do you overcome the risks of ...
3  cards
More on SSL and TLS
What is ssl and tls and what do t...,
What attack tricks tls into using...,
What is break and inspect and how...
3  cards
Secure Shell (SSH)
What protocol creates a secure ch...,
What are the two requirements to ...,
What port does ssh run on and wha...
4  cards
VPN Protocols
What can we use to create a secur...,
What are the 3 major vpn s,
What protocol encapsulates ppp pa...
13  cards
Planning for the Worst
What does redundancy mean in secu...,
What is a single point of failure
2  cards
Redundant Power
What is a redundant power supply,
What are the 5 concerns we muse h...,
What is an unexpected increase in...
8  cards
Backup Power
What is a surge protector combine...,
What is an emergency power system...,
What are the 3 types of backup ge...
3  cards
Data Redundancy / Disk Redundancy
What allows the combination of mu...,
Which raid provides data striping...,
Which raid provides redundancy by...
10  cards
Network Redundancy
What is the focus of network redu...,
What three connections does netwo...,
How do we accomplish network redu...
4  cards
Server Redundancy
What is the concept of two or mor...,
What two ways are server clustered,
When a primary server fails and t...
4  cards
Redundant Sites
What are the 3 redundant sites we...,
What site is a near duplicates of...,
What site has computers phones an...
4  cards
Data Backup
What are the three different type...,
What is a full backup,
What type of backup only backs up...
4  cards
Tape Rotation
What are the three types of tape ...,
What tape rotation is used once p...,
What tape rotation uses three set...
6  cards
Disaster Recovery Plan
What is an organized in depth pla...
1  cards
Business Impact Analysis
What is a systematic activity tha...,
How is business impact analysis g...,
What are the metrics that bia is ...
10  cards
Policies and Procedures
What is the difference between po...,
What provides a comprehensive sec...,
What defines the role of security...
5  cards
Data Classifications
How do we classify data,
What are the four commercial data...,
What are the government classific...
13  cards
Data Ownership
What is the responsibility for th...,
A senior generally executive role...,
What role is focused on the quali...
5  cards
PII and PHI
What kind of data can be used by ...,
What law affects the us governmen...,
What law affects healthcare provi...
9  cards
Legal Requirements
What regulation requires that per...,
Gdpr also allows the user to with...,
Reminder
3  cards
Privacy Technologies
What is the method and techs that...,
What deidentification method uses...,
What deidentification method uses...
5  cards
Security Policies
What defines the rules that restr...,
What governs the labeling and han...,
What defines the structured way o...
4  cards
Vendor Relationships
What is an agreement between two ...,
What non binding agreement betwee...,
What type of agreement is concern...
5  cards
Disposal Policies
What process of disposal uses pow...,
What act of removing data ensures...,
What act of disposal removes the ...
6  cards
IT Security Framework
What do we use it security framew...,
Who makes the consensus developed...,
What framework integrates securit...
13  cards
Incident Response Procedures
What what is occurring when an in...,
What do you call the overall prog...,
What are the six steps in an inci...
9  cards
Incident Response Planning
Who are the key people that have ...,
What are the key positions of an ...,
Who is the single point of contac...
9  cards
Investigative Data
What security tool collects data ...,
What type of file records events ...,
What are the different type of lo...
10  cards
Forensic Procedures
What ensures that personnel handl...,
What are the four main area s of ...,
What phase of forensic procedures...
10  cards
Data Collection Procedures
After an attack before you restor...,
What is the order of volatility
2  cards
Security Tools Part 1 (Network Tools)
What network diagnostic command w...,
What utility is used to determine...,
What utility displays network con...
10  cards
Security Tools Part 2 (Network Tools)
What command line tool is used to...,
What python script is used to gat...,
What automated scanner can be use...
7  cards
Security Tools Part 3 (File Manipulation)
What command line utility is used...,
What command line utility is used...,
What command line utility is used...
6  cards
Security Tools Part 4 (Shells and Scripts)
What utility creates an encrypted...,
What microsoft task automation an...,
What interpreted high level gener...
4  cards
Security Tools Part 5 (Packet Capture)
What command line utility allows ...,
What suite of free open source ut...,
What network analysis tools is us...
3  cards
Security Tools Part 6 (Forensics)
What command line utility is used...,
What data preview and imaging too...,
What linux command line utility d...
5  cards
Security Tools Part 7 (Exploitation)
What pen test tool offers informa...,
What tool can use one or more bro...,
What password recovery tool is us...
4  cards
Ports & Protocols
How many ports are there what is ...,
Ftpfile transfer protocol,
Ssh scp sftpsecure shell secure c...
37  cards

More about
Cyber Security 601

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study L PUA's Cyber Security 601 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-601) TMM
  • 35 decks
  • 745 flashcards
  • 1 learners
Decks: Security Overview, Malware, Malware Infections, And more!
Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 9 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
Study CompTia SY0-601
  • 24 decks
  • 746 flashcards
  • 12 learners
Decks: Must Know Items, Security Acronyms, Ports To Service, And more!
Cyber Security
  • 12 decks
  • 249 flashcards
  • 2 learners
Decks: Practice Test 1, Social Engineering, Malware, And more!
Make Flashcards