1.3 Surveying the Cyberspace Flashcards
Security architecture
unified security design that addresses the necssitites and potential risks involved in a certain scenario or environment.
-specifies when and where to apply security controls.
Security operations
The process that identifies critical information to determine if friendly actions can be observed by enemy intelligence and if information obtained by adversaries could be useful to them, and then executes selected measures that eliminates or reduce adversary exploitation of friendly critical information.
Governance:
framework for managing performance and risk, oversight of compliance and control responsibilities, and defining the cyber mission by mapping the structure, authority, and processes to create an effective program.
Physical security
The protection of personnel, hardware, software, networks, and data from physical actions and events that could cause serious loss or damage to an enterprise, agency, or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism, and terrorism
Threat intelligence
Evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging threat to assets, which can be used to inform decisions about responding to that threat.
Career development:
Training of future cybersecurity professionals.
Risk assessment:
Analyzing what can go wrong, how likely it is to happen, what the potential consequences are, and how tolerable the identified risk is.
User education
Teaching users how to protect themselves from cyberattacks by informing them of risks, exploits, and external threats as well as teaching them the skills needed to combat common attacks.
Frameworks and standards:
The creation of new security frameworks and practices for professionals to follow.