Deck Flashcards
What is cybersecurity?
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
What is cloud security?
A sub-field
The process of ensuring that assets stored in the cloud are properly set up correctly and access to those assets is limited to authorized users
Specifically focuses on the protection of data, application, and infratstructure in the cloud
What is an internal threat?
A current or former employee, external vendor, or trusted partner who poses as a security risk
What is network security?
The practice of keeping an organization’s network infrastructure secure from unauthorized access
This includes data, services, systems, and devices that are stored in an organization’s network
What is PII? What does it stand for?
Personal Identifiable Information. Any information used to infer an individual’s identity
What is security posture?
An organization’s ability to manage its defense of critical assets and data and react to change
What is SPII? What does it stand for?
Sensitive Personal Identifiable Information. A specific type of PII that falls under stricter handling guidelines/
What is technical skills?
Skills that require knowledge of specific tools, procedures, and policies
What is a threat?
Any circumstance or event that can negatively impact assets
What is a transferable skill?
Skills from other areas that can apply to different careers
What is a threat actor?
Any person or group who presents a security risk
What is to install detection software?
security professionals collaborating with information technical teams to deploy an application that helps identify risks and vulnerabilities
What is identity theft?
an individual having their personal information stolen and could commit fraud or impersonate them
what is regulatory compliance
laws and guidelines that require implementation of security standards
What are security analysts responsible for?
There are 4 points
- protecting computer and network systems
- search for weaknesses
- installing prevention softwares
- conducting periodic security audits