DATA COMPLIANCE REVIEWED EXAM
STUDYGUIDE
Cryptography
Study of secure communication techniques
Authentication
Verification of user identity
Cyber Attacks
Malicious attempts to disrupt or gain unauthorized access
Access Control
Restricting user access to resources
Network Security
Protection of network infrastructure
Privacy & Online Rights
Protection of personal information online
Social Engineering
Manipulating individuals to divulge confidential information
Firewalls
Security barriers to prevent unauthorized access
IDS, IPS
Intrusion Detection Systems & Intrusion Prevention
Systems
Risk Management
Identifying and mitigating potential threats
Policy and Governance
Establishing rules and oversight for security measures
Confidentiality
, Ensuring data privacy and secrecy
Integrity
Maintaining data accuracy and consistency
Availability
Ensuring data and services are accessible when needed
Authenticity
Verifying the origin and correctness of data
Non-repudiation
Preventing denial of actions or transactions
PEBCAK
Problem Exists Between Chair and Keyboard
CIA model
Confidentiality, Integrity, Availability framework
Risks, Threats, Vulnerabilities, Exploits
Different aspects of potential security breaches
Symmetric Encryption
Using the same key for encryption and decryption
RSA
Rivest-Shamir-Adleman encryption algorithm
SSH authentication
Secure Shell protocol for user authentication
OS access control
Operating System mechanisms to restrict user access
Wireshark sniffing
Packet analyzing tool for network security
Sniffing and Spoofing
Illegally intercepting data and falsifying sender information
Privacy Impact Assessment
Evaluation of data privacy implications
Essential 8 study
Comprehensive security awareness program