.01 RG Vocab introduction to cyber security Flashcards
adaptive threat replication engineer
Replicates real threats to understand how they
operate and neutralizes them
Blue team
A security team responsible for maintaining overall system security, preventing
security breaches, monitoring potential threats, and researching security technology; typically
responsible for finding and implementing security controls to strengthen the CIA triad
Certification
Proof of technical knowledge backed by an industry-standard provider such
as Microsoft or CompTIA
Cybersecurity
“The art of protecting networks, devices, and data from unauthorized access
or criminal use and the practice of ensuring confidentiality, integrity, and availability of
information” —Cybersecurity and Infrastructure Security Agency (2019)
Cybersecurity engineer
Keeps computer information systems secure and controls access
to systems based on user classifications
Cyberseek
Website that provides details on cybersecurity-related positions in the US job
market
Defensive cybersecurity analyst
: Researches and evaluates security threats and
products; recommends improvements to organizational cyber defense
Digital forensic investigator
Gathers digital information evidence and trails in the systems
to determine how cybercrimes were committed
Ethical hacker
Hired by organizations to legally hack into their networks and identify weak
entry points
Incident detection engineer
Replicates real threats to understand how they operate and
how to neutralize them
IT auditor
Assesses technology for potential security, efficiency, and compliance issues
Network security administrator
: Responsible for the management and monitoring of
organizational network security
Red team
An organizational security team responsible for providing security assessments
outlining an organization’s system defense efficacy and resilience; uses penetration testing
tools to search for weaknesses and vulnerabilities
Security operations center (SOC) analyst
Monitors and manages networks; works with
intrusion detection/prevention systems
Vulnerability assessment analyst
Hunts for critical flaws and vulnerabilities in networks,
often as a third-party consultant