This three-part framework ensures data confidentiality, integrity, and availability.
What is the CIA Triad?
Self-replicating malware that doesn't require human interaction to spread.
What is a worm?
The process of verifying that a user is who they claim to be.
What is authentication?
The act of converting plaintext into unreadable ciphertext.
What is encryption?
The layer of the OSI model responsible for deciding which physical path data will take.
What is Layer 3 (Network Layer)?
A weakness in a system that could potentially be exploited by an attacker.
What is a vulnerability?
A malicious program disguised as legitimate software.
What is a Trojan horse?
The principle that states users should receive only the minimum permissions necessary to perform their job functions.
What is the least-privilege principle?
A cryptographic method that uses the same key for both encryption and decryption.
What is symmetric cryptography?
The protocol used to map IP addresses to MAC addresses on a local network.
What is ARP (Address Resolution Protocol)?
This type of attacker uses their skills for good and operates within legal boundaries.
What is a white hat hacker?
An attack where a threat actor intercepts and potentially modifies communication between two parties.
What is an on-path or man-in-the-middle attack?
A framework that uses UDP ports 1812 and 1823 for remote authentication and accounting in AAA systems.
What is RADIUS?
A cryptographic method that uses two different keys: a public key and a private key.
What is asymmetric cryptography?
The successor to IPv4, designed to solve address space limitations.
What is IPv6?
A security strategy that implements multiple layers of defensive controls.
What is defense-in-depth?
A phishing attack that targets high-value individuals like executives and CEOs.
What is whaling?
A security solution that collects logs, correlates them, and notifies administrators about abnormalities or policy breaches.
What is SIEM (Security Information and Event Management)?
The process of adding random characters to data before hashing to increase security.
What is salting?
This notation allows efficient allocation of IP addresses and uses a forward slash followed by a number (e.g., /24).
What is CIDR (Classless Inter-Domain Routing) notation?
A person or group within an organization that poses a threat to the confidentiality, integrity, or availability of that environment.
What is an insider threat?
A sophisticated, targeted attack that persists over a long period and is typically carried out by advanced threat actors.
What is an Advanced Persistent Threat (APT)?
A security tool that automates responses to detected threats and reduces the need for human intervention.
What is SOAR (Security Orchestration, Automation and Response)?
A set of identities, roles, policies, and actions for the creation, use, management, distribution, and revocation of digital certificates.
What is Public Key Infrastructure (PKI)?
The three components of Cisco Advanced Malware Protection (AMP) are: AMP for Endpoints, AMP for Networks, and this third component.
What is AMP for Cloud?