Cybersecurity 2 Flashcards
Identifying, analyzing, and preserving criminal evidence within networks, computers, and electronic devices.
Computer Forensics
skills from other areas of study or practice that can apply to different careers.
Transferable skills
these skills may apply to several professions, as well; however, they typically require knowledge of specific tools, procedures, and policies
Technical skills
tools that collect and analyze log data, or records of events such as unusual login behavior, and support analysts’ ability to monitor critical activities in an organization. This helps cybersecurity professionals identify and analyze potential security threats, risks, and vulnerabilities more efficiently.
Security information and event management (SIEM) tools
Cybersecurity analysts use this to monitor system activity and alerts for possible intrusions. For example, you might use it to monitor networks for signs of malicious activity, like unauthorized access to a network.
Intrusion detection systems (IDSs)
This knowledge allows security teams to build stronger defenses against threat actor tactics and techniques. By staying up to date on attack trends and patterns, security professionals are better able to recognize when new types of threats emerge such as a new ransomware variant.
Threat landscape knowledge
Cybersecurity analysts need to be able to follow established policies and procedures to respond to incidents appropriately. For example, a security analyst might receive an alert about a possible malware attack, then follow the organization’s outlined procedures to start the ________?
Incident response processes