The principle ensuring data remains unaltered and trustworthy
What is integrity?
Policies and procedures controlling security
What are administrative controls?
Involves understanding vulnerabilities and threats
What is risk management?
Connects devices in a single network
What is a switch?
The numerical label assigned to devices in a network
What is an IP address?
What ensures information is only accessible to authorized individuals
What is confidentiality?
Controls restoring system functionality
What are corrective controls?
Provides insights into potential threats
What is threat intelligence?
Directs traffic between networks
What is a router?
Model representing layers of a network
What is the OSI Model?
Systems and data accessibility principle
What is availability?
Control type intended to prevent incidents
What are preventative controls?
Entities attempting to compromise systems
What are threat actors and adversaries?
Assists in network diagnosis and troubleshooting
What are networking tools?
Designed to block unauthorized access to networks
What is a firewall?
The significance of the CIA in the CIA Triad
What is Confidentiality, Integrity, Availability?
Aids in identifying malicious activities
What are detective controls?
Mimics adversary behaviuor
What is threat emulation?
The regular Internet is also referred to as _______
What is the Clearnet (Surface Web)?
The hidden part of the internet often associated with illegal activities
What is the Darknet?
Provides an overview of safeguarding measures for data
What is Security Controls Overview?
Control type aiming to discourage potential threats
What are deterrent controls?
Examples of cyber attacks
What are DDoS and phishing?
Part of the internet containing databases and password-protected sites
What is the Deep Web?
System detecting unauthorized intrusions
What is an IDS (Intrusion Detection System)?