Cybersecurity: Module 1 Flashcards

1
Q

What is the process of Compliance?

A

the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Security Frameworks?

A

guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Security Controls?

A

safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Security Posture? What does a strong Security posture do?

A

an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Threat Actor?

A

malicious attacker, is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Internal Threat?

A

can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor intentionally engages in risky activities, such as unauthorized data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Security is the practice of… What does it include?

A

the practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Cloud?

A

The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Transferable Skills

A

skills from other areas of study or practice that can apply to different careers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Technical Skills

A

may apply to several professions, however, they typically require knowledge of specific tools, procedures, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of skill is communication? and what does it allow?

A

A transferable skill that will allow you to communicate and collaborate with others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of skill is Problem-solving? and what does it allow you to do?

A

transferable skill that will allow you to identify and solve problems. This skill will allow you to recognize attack patterns & then determine the most efficient solution to minimize risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dont be afraid to _ & _…

A

Take risks and try new things! Please understand that it is rare to find a perfect solution to a problem and you will likely need to compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of skill is Time Management? and what does it allow you to do?

A

A transferable skill that involves having a heightened sense of urgency and prioritizing tasks appropriately. Effective time-management will help you minimize potential damage and risk critical assests and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of skill is a Growth Mindset? What does it mean if you have this?

A

A transferable skill that means you have a willingness to learn. You will need to continue to learn throughout your career.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of skill is a Diverse Perspective? How will this benefit you?

A

A transferable skill that involves having respect and an inclusive mindset with mutual respect. You will find better solutions to security problems with others.

17
Q

What type of skill is Programming languages? And what does it involve?

A

A technical skill that involves knowing how to search data to identify potential threats or organize and analyze information to identify patterns.

18
Q

What type of skill is Security Information and Event Management (SIEM) tools and what do they do/how do they help?

A

A technical skill. SIEM tools collect and analyze log data or records of events of unusual data. These tools help professionals identify and analyze potential security threats, risks and vulnerabilities.

19
Q

What are (IDS)? What type of skill are they and why are they important? Give an example (4 part Question)…

A

Intrusion Detection Systems. A technical skill. Analysts use IDS to monitor system activity and alerts for possible intrusions. IDS are a key tool that every organization uses to protect assets and data. Ex: I use IDS to monitor networks for malicious activity like unauthorized access to a network.

20
Q

What type of skill is Threat Landscape Knowledge? What does it involves and what does it allow?

A

A technical skill. It involves being aware of current trends related to threat actors, malware, or threat methodologies. It will allow you to build stronger defense against threat actor tactics and techniques.

21
Q

What is an Incident Response process? Give an example. What type of skill is this?

A

An incident response process is following established policies and procedures to respond to incidents appropriately. Ex: I receive an alert about a possible malware attack so I follow the organization’s outlined procedures to start the incident response. It is a technical skill.

22
Q

What is Cybersecurity?

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

23
Q

What is Cloud Security? What does it focus on?

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users. It focuses on the protection of data, applications, and infrastructure in the cloud.

24
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity (name, address, DOB…)

25
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls under stricter handling guidelines (SSN, Bank acc numbers, medical information…)

26
Q

What occurs during a security audit?