Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
12 Cards in this Set
- Front
- Back
- 3rd side (hint)
CIA triad |
Confidentiality, integrity and availability |
Corner stone values of cyber security |
|
NIST |
National institute of standards and tech frameworks |
|
|
SIEM |
Security information and event management |
What is the name of the plans for action |
|
GUI |
Graphical user interface |
Type of user interface |
|
CLI |
Command line interface |
Type of interface |
|
Regex |
Regular expressions |
|
|
IDSs |
Intrusion detection systems |
Preventative measure |
|
PII |
Personally identifiable information |
One of the sources of ID theft |
|
SPII |
Sensitive personally Identifiable information |
|
|
CSIRTS |
Computer security incident response teams |
Came about after the Morris worm in 1988 |
|
BEC |
Business Email Compromise |
Basis of company phishing |
|
CISSP |
Certified information systems Security Professional |
Structured the 8 security domains of cyber security |