foundations Flashcards
(25 cards)
Compliance
the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.
Security frameworks
guidelines used for building plans to help mitigate risks and threats to data and privacy.
Security controls
safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture
Security posture
an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization
threat actor
any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.
internal threat
current or former employee, an external vendor, or a trusted partner who poses a security risk
Network security
the practice of keeping an organization’s network infrastructure secure from unauthorized access
Cloud security
the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users
Programming
a process that can be used to create a specific set of instructions for a computer to execute tasks.
Security information and event management (SIEM) tools:
collect and analyze log data, or records of events such as unusual login behavior, and support analysts’ ability to monitor critical activities in an organization
Intrusion detection systems (IDSs)
monitor system activity and alerts for possible intrusions
Threat landscape knowledge
allows security teams to build stronger defenses against threat actor tactics and techniques-staying up to date on attack trends and patterns
computer virus
malicious code written to interfere with computer operations and cause damage to data and software
worm
type of computer virus that can duplicate and spread on its own without human involvement.
Social engineering
a manipulation technique that exploits human error to gain private information, access, or valuables.
Phishing
the use of digital communications to trick people into revealing sensitive data or deploying malicious software
CSIRTs
computer security incident response teams
Security and risk management
focuses on defining security goals and objectives, risk mitigation, compliance, business continuity, and the law
asset security
focuses on securing digital and physical assets. It’s also related to the storage, maintenance, retention, and destruction of data
security architecture and engineering
optimizing data security by ensuring effective tools, systems, and processes are in place
communication and network security
managing and securing physical networks and wireless communications.
identity and access management
focuses on keeping data secure, by ensuring users follow established policies to control and manage physical assets, like office spaces, and logical assets, such as networks and applications
security assessment and testing
conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats, and vulnerabilities
security operations
conducting investigations and implementing preventative measures