Port scans, vulnerability scans, and penetration tests
What is Availability Testing?
Wired Networks
What is a type of Data in Transit?
Sets the rules for expected behavior
What is one of the many tasks for accomplishing a security policy?
Look at / Monitor open ports on a host or server
What are Network and Port Scanners?
Organizations also post banners and signage to increase overall cybersecurity awareness
What do organizations do to increase cybersecurity awareness?
The accuracy, consistency, and trustworthiness of data during its entire life cycle
What is Integrity in Cybersecurity?
Means that a type of storage device retains the data when no user or process is using it
What is Data at Rest?
What is a guideline?
Content Filtering Services
What is one of the hardware technologies used for safeguarding?
A day spent on awareness of cybersecurity
What is a cybersecurity awareness day?
Prevents the disclosure of information to unauthorized people, resources, and processes
What is Confidentiality in Cybersecurity?
Involves sending information from one device to another
What is Data In Transit?
A set of security objectives for a company that includes rules of behavior for users/administrators and specifies system requirements
What is a security policy?
Programs and services that protect OS, databases, and other services operating on workstations, portable devices, and server
What is Software in Technology?
The creation of cybersecurity orientation workshops and seminars help to increase awareness
What is a way to help security awareness?
Backup of organization data, configuration data, and personal data ensures system availability
What is a Backup System?
RAID provides improved performance and fault tolerance
What does RAID (Redundant array of independent disks) help with?
An information security standard published in 2005 and revised in 2013
What is ISO/IEC 27000?
Contain rules that define the traffic allowed into and out of a network
What is a Firewall?
The organization’s environment / The level of threat to cybersecurity
What does an active security awareness program depend on?
Information belonging to a government body classified by its level of sensitivity
What is Classified Information?
Multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk
What is RAID? (Redundant array of independent disks)
The ISO model uses domains instead of layers because each domain has a direct relationship with the other domains
What is the difference between the ISO and OSI models?
Software Firewalls, Network and Port Scanners, Protocol/Signature Analyzers, Vulnerability Scanners, Host-Based Intrusion Detection Systems
What are the software-based technology commonly used for safeguarding?
Security awareness should be an ongoing process since new threats and techniques are always being developed
What should security awareness be?