This class was created by Brainscape user Cloy Fernandez. Visit their profile to learn more about the creator.

Decks in this class (33)

Information Security
Information security,
Confidentiality,
Integrity
9  cards
Assets
Primary assets,
Supporting assets on which the pr...
2  cards
Information
Business critical information,
Personal information,
Strategic information
4  cards
Business Processes
Business processes
1  cards
Hardware
This is the physical technology that,
Traditional physical security,
Physical location
3  cards
Software
The software component of is comp...,
Problems with software
2  cards
Networks
Component that increased need for...,
Personnel,
How might compromise of an info a...
4  cards
Personnel
Personnel
1  cards
Disseminating Policies
Disseminating policies,
Education,
Training
6  cards
Identification and Authentication
Users must be identified to enable,
Claimed identities must be authen...
2  cards
Password Weakness (Vulnerabilities)
Password weaknesses vulnerabilities
1  cards
Confidentiality v Availability
Traditional defence against passw...,
Enables a form of denial of service
2  cards
NCSC Password Guidance
Ncsc password guidance,
2  cards
Access Control
Access control fundamentals,
Authentication,
Authorisation
6  cards
Authentication
Verification that the identity of...,
2  cards
Authorisation
Ensuring access to resources is g...
1  cards
THREE widely used authentication mechanisms
Authentication factors
1  cards
Factors of Authentication
Something a supplicant knows,
Something a supplicant has,
Something a supplicant is
3  cards
Strong Authentication
Something only the supplicant knows,
Something only the supplicant pos...,
Something the supplicant is
3  cards
Biometric System Requirements
Universality,
Distinctiveness,
Persistence
7  cards
Effectiveness of Biometrics
False reject rate frr,
False accept rate far,
Crossover error rate cer
3  cards
Access Control Policies
Dac,
Mac,
Rbac
4  cards
File system permissions
File system permissions
1  cards
Privileged access
Administrator,
Sysadmins can,
Modify groups or levels of privilege
5  cards
Discretionary Access Control (DAC)
Dac
1  cards
Access Control List (ACL)
Acl
1  cards
Capability List (CL or C-List)
Capability list
1  cards
Mandatory Access Control (MAC)
Mandatory access control
1  cards
Bell LaPadula (BLP) Mode
Bell lapadula
1  cards
Additional Access Control Models
Bell lapadula confidentiality model,
Biba integrity model,
Clark wilson integrity model
6  cards
RBAC Relations
User role assignment,
Permission role assignment
2  cards
Attribute Based Access Control
Abac
1  cards
cryptography
Cryptography,
Encrypting something links four e...
2  cards

More about
Cyber Security Year 1

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Cloy Fernandez's Cyber Security Year 1 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 9 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
Cyber Security
  • 12 decks
  • 249 flashcards
  • 2 learners
Decks: Practice Test 1, Social Engineering, Malware, And more!
IT Cybersecurity
  • 14 decks
  • 443 flashcards
  • 71 learners
Decks: A It Essentials Quiz 1, A It Essentials Quiz 2, A It Essentials Quiz 3, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards