Summary Cyber Security CSIA Well elaborated summarized study guide 2024
2 views 0 purchase
Course
CSIA
Institution
CSIA
Information Security - Hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations
Risk - Likelihood that something bad will happen to an asset
Threat - Any action that could damage an asset
Vulnerability - A...
Cyber Security CSIA
Well elaborated summarized study guide 2024
Information Security - ✔✔✔Hardware, operating system, and application software that work together
to collect, process, and store data for individuals and organizations
Risk - ✔✔✔Likelihood that something bad will happen to an asset
Threat - ✔✔✔Any action that could damage an asset
Vulnerability - ✔✔✔A weakness that allows a threat to be realized or to have an effect on an asset
CIA Triad - ✔✔✔Confidentiality (people can see it), Integrity (people who can edit it are able to edit),
Availability (make sure systems are always up and online)
End User - ✔✔✔The weakest link in the Security of IT Infrastructure
Internet of Things & its challenges - ✔✔✔The interconnection via the Internet of computing devices
embedded in everyday objects, enabling them to send and receive data.
Security, privacy, interoperability, legal+regulatory, e commerce + compliance, economic development
issues
BYOD and the challenge it presents - ✔✔✔Bring your own device. Issues with mobile computing.
Network, usability, security
, OSI Reference Model, layers, and uses - ✔✔✔Open Systems Interconnection (Physical, Data Link,
Network, Transport, Session, Presentation, Application)
LAN - ✔✔✔Local Area Network; Provide network connectivity for computers located in the same area
WAN - ✔✔✔Wide Area Network; Connect systems over a large geographic area
TCP/IP - ✔✔✔A suite of protocols that operate at both the Network and Transport layers of the OSI
Reference Model
Governs all activity across the Internet and through most corporate and home networks
Developed by the DoD to provide a highly reliable and fault-tolerant network infrastructure (security
was not a focus)
IP address - ✔✔✔IPv4 addresses
Four-byte (32-bit) addresses that uniquely identify every device on the network
Still the most common
IPv6 addresses
Are 128 bits long
Provide more unique device addresses
Are more secure
Firewall - ✔✔✔Controls the flow of traffic by preventing unauthorized network traffic from entering or
leaving a particular portion of the network
Business Impact Analysis - ✔✔✔An analysis of an organization's functions+activities that classifies
them as critical or noncritical
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EdwinEdwin99. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $6.49. You're not tied to anything after your purchase.