Common cybersecurity terminology Flashcards

1
Q

Compliance?

A

is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security framework?

A

guidelines used for buildings plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security controls

A

Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Actor (malicious attacker)

A

Any person or group who presents a security risk. This risk relates to computers, applications, networks, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal Threat

A

can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. Internal risks can be accidental and intentional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give an example of an accidental internal risk

A

an employee who accidentally clicks on a malicious email link would be considered an accidental threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give an example of an intentional internal threat

A

the internal threat actor intentionally engages in risky activities, such as unauthorized data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly