ACCESS CONTROL
SECURITY
KEEPING INFORMATION SAFE
100

To regulate who can view or use resources in a computing environment.

What is the primary purpose of access control in cybersecurity?

100

Security, Education and Compliance

What is SEC (in context of cybersecurity)?

100

Use strong passwords and regularly update software

What are was to keep information safe online?

200

Discretionary Access (DAC) and Mandatory Access Control (MAC)

What is two types of access control models?

200

Firewalls or Encryption

What are some common security measure organizations?

200

Protects sensitive information by converting it to a code that can only be read by authoriuzed parties.

What is the importance of data encryption?

300

Users should have the minimum level of access necessary to perform their job functions.

What is the principle of priviledge?

300

An incident that results in unauthorized access to data or a system

What is a security breach?

300

A technique used to trick individuals into providing sensitive information by impersonating a trustworthy entity.

What is phishing?

400

A security system that requires more than one method of aunthentication from independent categories of credentials to verify a user's identity.

What is multi-factor authentication (MFA)?

400

Identify vulnerabilities and potential threats or risks

What is one way to assess risks in information security?

400

Following company best practices and being aware of security policies.

What are ways for employees contribute to keeping information safe?

500

The assignment of permissions based on roles - this minimizes the risk of unauthorized access

What is Role-based access control?

500

Helps organizations to prepare for annd effectively respond to security incidents

What is incident response planning?

500

Educate employees about security risks and best practices to reduce the likelihood of human error leading to breeches

What is the role of cybersecurity training in organizations?