Definitions Flashcards
Cybersecurity
the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Threat actor
(malicious actor) person or group that presents a security risk; risk can be to computers, applications, networks, and data
Transferable Skills
skills from other areas that can apply to different careers
Playbook
reference guide for certain detections and how to investigate incidents
Technical Skills
skills that require knowledge of specific tools, procedures, and policies
Personally Identifiable Information (PII)
information used to infer an individual’s identity; full name, date of birth, physical address, phone number, email address, IP address
Sensitive Personally Identifiable Information (SPII)
stricter handling guidelines of information used to infer an individual’s identity; social security number, medical information, financial (bank) information, and biometric data (facial recognition)
Identity theft
act of stealing PII/SPII to commit fraud while impersonating a victim; for financial gain
5 Benefits of Security
- Protects against external and internal threats
- Meets regulatory compliance
- Maintains and improves business productivity
- Reduces expenses
- Maintains brand trust
Common Job Titles
- Security analyst/specialist
- Cybersecurity analyst/specialist
- Security operations center (SOC) analyst
- Information security analyst
Analyst Responsiblities
Responsible for monitoring and protecting information and system. This includes protecting computer and software systems, installing prevention software, and conducting periodic security audits.
Operations
responding to detections and doing investigations
Projects
working with other teams to build new detections or improve the current ones (mostly engineers)
Compliance
process of adhering to internal standards as well as external regulations and enables organizations to avoid fines and security breaches
Security frameworks
guidelines used for building plans to help mitigate risks and threats to data and privacy