.01 RG Vocab introduction to cyber security Flashcards
adaptive threat replication engineer
Replicates real threats to understand how they
operate and neutralizes them
Blue team
A security team responsible for maintaining overall system security, preventing
security breaches, monitoring potential threats, and researching security technology; typically
responsible for finding and implementing security controls to strengthen the CIA triad
Certification
Proof of technical knowledge backed by an industry-standard provider such
as Microsoft or CompTIA
Cybersecurity
“The art of protecting networks, devices, and data from unauthorized access
or criminal use and the practice of ensuring confidentiality, integrity, and availability of
information” —Cybersecurity and Infrastructure Security Agency (2019)
Cybersecurity engineer
Keeps computer information systems secure and controls access
to systems based on user classifications
Cyberseek
Website that provides details on cybersecurity-related positions in the US job
market
Defensive cybersecurity analyst
: Researches and evaluates security threats and
products; recommends improvements to organizational cyber defense
Digital forensic investigator
Gathers digital information evidence and trails in the systems
to determine how cybercrimes were committed
Ethical hacker
Hired by organizations to legally hack into their networks and identify weak
entry points
Incident detection engineer
Replicates real threats to understand how they operate and
how to neutralize them
IT auditor
Assesses technology for potential security, efficiency, and compliance issues
Network security administrator
: Responsible for the management and monitoring of
organizational network security
Red team
An organizational security team responsible for providing security assessments
outlining an organization’s system defense efficacy and resilience; uses penetration testing
tools to search for weaknesses and vulnerabilities
Security operations center (SOC) analyst
Monitors and manages networks; works with
intrusion detection/prevention systems
Vulnerability assessment analyst
Hunts for critical flaws and vulnerabilities in networks,
often as a third-party consultant
Interview coaching
Working with an instructor or a professional trainer to develop various
interview strategies and garner constructive feedback to improve overall interview skills
Professional networking
Building and maintaining relationships with other professionals
that work directly within one’s field or in other related areas (Indeed Editorial Team, 2021)
Business continuity
An organizational plan to deal with disasters and other difficult
situations such as cyberattacks, outages, or supply chain failures
Financial impact
The overall fiduciary cost of an attack or breach to an organization
Legal liability
Once a business becomes responsible for any individual’s data, it becomes
subject to privacy laws. The business could face fines or additional legal penalties if it
breaches those laws.
Loss of productivity
When employees cannot perform their jobs because of a breach or
attack (ransomware being an excellent example)
Organizational impact
A cybersecurity attack or breach’s impact on an organization’s
profits, productivity, image, etc.
Personally identifiable information (PII)
Any information that could identify an
individual, including address, date of birth, social security number, etc
Reputational loss
Losing the trust of business relationships, customers, and partners after
a breach or attack