Security Concepts
CIA Triad
Encryption
IAM & Authentication
Security Tools
100

This attack method focuses on exploiting human behavior instead of technology.

Social engineering

100

This ensures data is only accessible to authorized users.

Confidentiality

100

Data before encryption is called this.

Plaintext

100

This verifies who a user is.

Authentication

100

This device filters traffic between networks.

Firewall

200

This type of attack tricks users into giving up confidential information.

What is Phishing

200

This ensures data is not altered during transmission.

Integrity

200

Data after encryption is called this.

Ciphertext

200

This determines what a user can access.

Authorization

200

This tool detects suspicious activity but does not stop it.

IDS

300

This type of attack locks your data until payment is made.

Ransomware

300

This ensures systems and data are accessible when needed.

Availability

300

This type of encryption uses one key.

Symmetric

300

This logs user activity.

Accounting

300

This tool actively blocks malicious activity.

IPS

400

This type of attack attempts to overwhelm a system and make it unavailable.

Denial of Service

400

Encryption primarily supports this part of the CIA triad.

Confidentiality

400

This type of encryption uses a public and private key.

Asymmetric

400

Using two or more authentication factors is called this.

MFA

400

This server acts as an intermediary and creates logs.

Proxy server

500

Redirecting a user to a fake website that looks real is called this.

Pharming

500

Backups and redundancy primarily support this concept.

Availability

500

This is the piece of information used to encrypt and decrypt data.

Key

500

This allows one login for multiple systems.

SSO

500

These rules determine what traffic is allowed or denied.

ACL