8. Prepare for cybersecurity jobs Flashcards
Business continuity plan BCP
document that outlines the procedures to sustain business operations during and after a significant disruption
Confidential data
data that often has limits on the number of people who have access to it
Disaster recovery plan
plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident
Private data
info that should be kept from the public
Public data
data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others
Security mindset
ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data
Sensitive data
type of data that includes personally identifiable info PII, sensitive personally identifiable info SPII, and protected health info PHI
Data controller
person that determines the procedure and purpose for processing data
data processor
person that is responsible for processing data on behalf of the data controller
Data protection officer DPO
individual that is responsible for monitoring the compliance of an organization’s data protection procedures
Escalation policy
set of actions that outlines who should be notified when an incident alert occurs and how that incident should be handled
Improper usage
incident type that occurs when an employee of an organization violates the organization’s acceptable use policies
Incident esclation
process of identifying a potential security incident, triaging it, and handing it off to a more experienced team member
Malware infection
incident type that occurs when malicious software designed to disrupt a system infiltrates an organization’s computers or network
Unauthorized access
incident type that occurs when an individual gains digital or physical access to a system or an application without permission