100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Cyber Security CSIA Well elaborated summarized study guide 2024

Rating
-
Sold
-
Pages
8
Uploaded on
28-03-2024
Written in
2023/2024

Information Security - Hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations Risk - Likelihood that something bad will happen to an asset Threat - Any action that could damage an asset Vulnerability - A weakness that allows a threat to be realized or to have an effect on an asset CIA Triad - Confidentiality (people can see it), Integrity (people who can edit it are able to edit), Availability (make sure systems are always up and online) End User - The weakest link in the Security of IT Infrastructure Internet of Things & its challenges - The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. Security, privacy, interoperability, legal+regulatory, e commerce + compliance, economic development issues BYOD and the challenge it presents - Bring your own device. Issues with mobile computing. Network, usability, security

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
March 28, 2024
Number of pages
8
Written in
2023/2024
Type
Summary

Subjects

Content preview

Cyber Security CSIA
Well elaborated summarized study guide 2024


Information Security - ✔✔✔Hardware, operating system, and application software that work together
to collect, process, and store data for individuals and organizations



Risk - ✔✔✔Likelihood that something bad will happen to an asset



Threat - ✔✔✔Any action that could damage an asset



Vulnerability - ✔✔✔A weakness that allows a threat to be realized or to have an effect on an asset



CIA Triad - ✔✔✔Confidentiality (people can see it), Integrity (people who can edit it are able to edit),
Availability (make sure systems are always up and online)



End User - ✔✔✔The weakest link in the Security of IT Infrastructure



Internet of Things & its challenges - ✔✔✔The interconnection via the Internet of computing devices
embedded in everyday objects, enabling them to send and receive data.

Security, privacy, interoperability, legal+regulatory, e commerce + compliance, economic development
issues



BYOD and the challenge it presents - ✔✔✔Bring your own device. Issues with mobile computing.
Network, usability, security

, OSI Reference Model, layers, and uses - ✔✔✔Open Systems Interconnection (Physical, Data Link,
Network, Transport, Session, Presentation, Application)



LAN - ✔✔✔Local Area Network; Provide network connectivity for computers located in the same area



WAN - ✔✔✔Wide Area Network; Connect systems over a large geographic area



TCP/IP - ✔✔✔A suite of protocols that operate at both the Network and Transport layers of the OSI
Reference Model

Governs all activity across the Internet and through most corporate and home networks

Developed by the DoD to provide a highly reliable and fault-tolerant network infrastructure (security
was not a focus)



IP address - ✔✔✔IPv4 addresses

Four-byte (32-bit) addresses that uniquely identify every device on the network

Still the most common



IPv6 addresses

Are 128 bits long

Provide more unique device addresses

Are more secure



Firewall - ✔✔✔Controls the flow of traffic by preventing unauthorized network traffic from entering or
leaving a particular portion of the network



Business Impact Analysis - ✔✔✔An analysis of an organization's functions+activities that classifies
them as critical or noncritical
$6.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
EdwinEdwin99

Get to know the seller

Seller avatar
EdwinEdwin99 Oxford University
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
223
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions