• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

CIA triad

Confidentiality, integrity and availability

Corner stone values of cyber security

NIST

National institute of standards and tech frameworks

SIEM

Security information and event management

What is the name of the plans for action

GUI

Graphical user interface

Type of user interface

CLI

Command line interface

Type of interface

Regex

Regular expressions

IDSs

Intrusion detection systems

Preventative measure

PII

Personally identifiable information

One of the sources of ID theft

SPII

Sensitive personally Identifiable information

CSIRTS

Computer security incident response teams

Came about after the Morris worm in 1988

BEC

Business Email Compromise

Basis of company phishing

CISSP

Certified information systems Security Professional

Structured the 8 security domains of cyber security