Foundation of Cybersecurity Module 1 Flashcards

1
Q

What is Compliance?

A

is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Security frameworks?

A

are guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Security controls?

A

are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Security posture?

A

is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Threat actor?

A

Any person or group who presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Internal threat?

A

Can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor intentionally engages in risky activities, such as unauthorized data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Network security?

A

is the practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Cloud security?

A

Is the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Persaonally Identifiable Information (PII)?

A

Any information used to infer and individual’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is sensitive personally identifable information (SPII)?

A

A specific type of PII that falls under stricter handling guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is identify theft?

A

Is the act of stealing personal information to commit fraud while impersonating a victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why security matters for a business?

A

Because ensures business continuity, prevent data loss or leaks that may affect reputation, increases financial growth and referrals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is cybersecurity?

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people and data from unauthorized access or criminal exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a threat?

A

A threat is any circumstance or event that can negatively impact assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly