Definitions Flashcards

1
Q

Cybersecurity

A

the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat actor

A

(malicious actor) person or group that presents a security risk; risk can be to computers, applications, networks, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transferable Skills

A

skills from other areas that can apply to different careers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Playbook

A

reference guide for certain detections and how to investigate incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Technical Skills

A

skills that require knowledge of specific tools, procedures, and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Personally Identifiable Information (PII)

A

information used to infer an individual’s identity; full name, date of birth, physical address, phone number, email address, IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sensitive Personally Identifiable Information (SPII)

A

stricter handling guidelines of information used to infer an individual’s identity; social security number, medical information, financial (bank) information, and biometric data (facial recognition)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identity theft

A

act of stealing PII/SPII to commit fraud while impersonating a victim; for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

5 Benefits of Security

A
  1. Protects against external and internal threats
  2. Meets regulatory compliance
  3. Maintains and improves business productivity
  4. Reduces expenses
  5. Maintains brand trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Common Job Titles

A
  1. Security analyst/specialist
  2. Cybersecurity analyst/specialist
  3. Security operations center (SOC) analyst
  4. Information security analyst
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Analyst Responsiblities

A

Responsible for monitoring and protecting information and system. This includes protecting computer and software systems, installing prevention software, and conducting periodic security audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operations

A

responding to detections and doing investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Projects

A

working with other teams to build new detections or improve the current ones (mostly engineers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compliance

A

process of adhering to internal standards as well as external regulations and enables organizations to avoid fines and security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security frameworks

A

guidelines used for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security controls

A

safeguards used to reduce specific security risks; used with security frameworks to bolster security posture

16
Q

Internal Threat

A

can be current or former employee, an external vendor, or a trusted partner who poses a security risk

17
Q

Accidental Threat

A

employee accidentally clicks on a malicious email link

18
Q

Network security

A

practice of keeping an organization’s network infrastructure secure from unauthorized access from data, services, systems, and devices that are stored in an organization’s network

19
Q

Cloud security

A

process of ensuring that assets stored in the cloud are properly configured and limited to authorized users

20
Q

The cloud

A

a network made up of a collection of servers via the internet

21
Q

Programming

A

process that can be used to create a specific set of instructions for a computer to execute tasks; automation of repetitive tasks (searching malicious domains), reviewing web traffic, and/or alerting suspicious activity

22
Q

Transferable Analyst Skills

A
  1. Communication
  2. Collaboration
  3. Problem-solving
    4.Time management
  4. Growth mindset
  5. Diverse perspectives (inclusive)
23
Q

Technical Analyst Skills

A
  1. Programming languages
  2. Security information and event management (SIEM) tools
  3. Intrusion detection systems (IDSs)
  4. Computer forensics
  5. Threat landscape knowledge
  6. Incident response
24
Q

Programming Languages

A

used to automate tasks and identify error messages

25
Q

SIEM tools

A

used to identify and analyze security threats, risks and vulnerabilities more efficiently; preventative action against cyber attacks

26
Q

IDSs

A

used to monitor system activity and alerts for possible intrusions; only detect and report events

27
Q

Digital forensic investigators

A

attempt to identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices

28
Q

Threat landscape knowledge

A

up to date on trends related to threat actors, malware, or threat methodologies

29
Q

Incident response

A

ability to detect and act upon a security threat

30
Q
A