Basics Flashcards
antivirus software
The software program used to prevent, detect and eliminate malware and viruses
asset management
The process of tracking assets, and the risks that affect them
asset inventory
A catalog of assets that need to be protected
Biometrics
The unique physical characteristics that can be used to verify a persons identity
Business continuity
An organizations ability to maintain their everyday productivity by establishing risk disaster recovery plans.
Business continuity plan (BCP)
A documented outlines the procedures to sustain business operations during and after a significant disruption
Business email compromise (BEC)
a type of fishing attack, where a threat actor impersonates a known source to obtain financial advantage
Computer virus
Malicious code written to interfere with computer operations, and cause damage to data and software
Cyber security
The practice of ensuring confidentiality, integrity and availability information by protecting networks devices, people and data from unauthorized access or criminal exploitation
Data
Information that is translated, processed or stored by a computer
hacker
Any person who uses computers to gain access to computers, systems, networks or data
Hacktivist
any person who uses hacking to achieve a political goal
Linux
Open source operating system
Log
A record of events that occur within an organization system
malware
software designed to harm devices or networks
National Institute of standards and technology (NIST) cybersecurity framework (CSF)
A voluntary framework that consists of standards guidelines, and best practices to manage cybersecurity risk
operating system (OS)
The interface between computer hardware and the user
order of volatility
A sequence outlining the order of data that must be preserved from first to last
Packet sniffing
The practice of capturing and inspecting data packets across the network
phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software
playbook
a manual that provides details about any operational action
ransomware
A malicious attack or threat actors and krypton organizations, data, and demand payment to restore access
risk
Anything that can impact the confidentiality, integrity, or availability of an asset
risk mitigation
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach
security information and event management (SIEM)
An application that collects and analyzes log data to monitor critical activities in an organization
sensitive data
A type of data that includes personally, identifiable, information(PII) , sensitive, personal identifiable (SPII) information, or protected health information (PHI)
social engineering
A manipulation technique that exploits human error to gain, private information, access, or valuables
spear phishing
A malicious email attack, targeting a specific user or group of users, appearing to originate from a trusted source
spyware
malware that’s used to gather and sell information without consent
SQL (structured query language)
A programming language used to create, interact with, and request information from a database
Threat
Any circumstance, or event that can negatively impact assets
threat actor
Any person or group who presents a security risk
USB baiting
an attack in which a threat actor strategically leaves a malware USB stick for an employee to find an install to unknowingly infected network
virus
Malicious code written to interfere with computer operations, and cause damage to data and software
Visual dashboard
A way of displaying various types of data quickly in one place
vulnerability
A weakness that can be exploited by a threat
vulnerability assessment
The internal review process of an organizations security systems
watering hole attack
A type of attack when a threat actor compromises a website frequently visited by a specific group of users
Layers of the web
Surface web
Deep web
Dark web
risk management framework (7)
Prepare
Categorize
Select
Implement
Assess
Authorize
Monitor
RMF Step 1: Prepare
Activities that are necessary to manage security security, and privacy risks before a breach occurs
RMF Step 2: Categorize
Used to develop risk management processes and tasks
RMF Step 3: Select
Choose, customize, and capture documentation of the controls that protect an organization
RMF Step 4: Implement
implement security and privacy plans for the organization
RMF Step 5: Assess
Determine if established controls are implemented correctly
RMF Step 6: Authorize
Being accountable for the security and privacy risks that may exist in an organization
RMF Step 7: Monitor
be aware of how systems are operating
Asset
An item perceived is having value to an organization. Assets can be digital or physical.