This class was created by Brainscape user Elliot Minns. Visit their profile to learn more about the creator.

Decks in this class (15)

1a - Understanding how internal threats occur
What is end point security 1,
What helps mitigate employee theft 2,
Some examples of employee sabotage 3
10  cards
1b - How External Threats Function
List the types of malware 1,
What does spyware do 2,
What does adware do 3
19  cards
2a - The Impact of Threats
Define operational loss 1,
Define financial loss 2,
Define reputational loss 3
8  cards
2b - Understanding system vulnerabilities 1
What is iptables firewall 1,
Features of software firewalls 2,
Features of hardware firewalls 3
11  cards
3a - Understanding system vulnerabilities 2
Define oem 1,
How can os updates cause system v...,
Why is ios seen as more secure th...
11  cards
3b - Understanding legal responsibilities 1
What year is the data protection ...,
What is the purpose of the gdpr 2,
Who is the ico 3
11  cards
4a - Understanding legal responsibilities 2
What year was the telecommunicati...,
What does the telecommunications ...,
What laws must a business respect...
8  cards
4b - Physical Security
Nam some site security measures 1,
Why is it important to lock the s...,
Why are biometric and card locks ...
9  cards
5a - AV, Firewalls, and NAT
What is av real time protection 1,
Define signature detection 2,
Define heuristic detection 3
9  cards
5b - User Authentication
List forms of user authentication 1,
How do graphical passwords work 2,
What is mfa 3
7  cards
Preparing for the activities
What will help identify the risk ...,
When explaining the risks it shou...,
How many threats should be addres...
13  cards
6a - Encryption
Applications of encryption 1,
What is data at rest 2,
What is data in transit 3
9  cards
6b - Further hardware/software measures
What is principle of least privil...,
What is a network audit 2,
What is trusted computing 3
8  cards
7a - Types of networks
List the types of networks 1,
What is an intranet 2,
What is an extranet 3
3  cards
7b - Topologies and Architecture
List topology architectures 1,
What is a physical topology 2,
What is a logical topology 3
5  cards

More about
Cyber Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Elliot Minns's Cyber Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 19 decks
  • 2738 flashcards
  • 137 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 53 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Make Flashcards