Basics Flashcards

Words used in Cybersercurity

1
Q

Compliance

A

The process of adhering to internal standards and external regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Frameworks

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Controls

A

Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Posture

A

An organization’s ability to manage its defense of critical assets and data to react to change. A strong security posture leads to lower risk of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Actor

A

Or Malicious person, is any person or group who presents a risk to computers, applications, networks, or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal threat

A

A current or former employee, external vender, or a trusted partner who poses a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud security

A

The process of ensuring that assets stored in the cloud are properly configures, or set up correctly, and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIEM

A

Security information and event management. Is a tool that collects and analyze data in computers and networks in an organization. It monitors unusual login behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IDSs

A

Intrusion detection systems. A system that monitors activity and alerts for possible intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PII

A

Personally Identifiable Information. Any information used to infer an individuals identity. ( Full name, date of birth, Physical address, Phone number, email address, internet protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SPII

A

Sensitive Personally Identifiable Information. A specific type of PIII that falls under stricter handling guidelines. ( social security numbers, medical or financial information, and biometric data such as face recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly