Foundations: Module 1 Flashcards
Cybersecurity
Protecting systems and data from digital threats.
Compliance
Following rules and laws.
Security Frameworks
Plans that help protect data and reduce risks.
Security Controls
Steps taken to lower security risks.
Security Posture
How well an organization can defend itself from attacks.
Threat Actor
Anyone who could cause problems for computers, apps, networks, or data.
Internal Threat
A security risk caused by someone you trust, like an employee or partner. It can happen on purpose or by mistake.
Network Security
Protecting a company’s network and everything on it—like data, systems, and devices—from people who shouldn’t have access.
Cloud Security
Keeping cloud data and systems safe by setting them up correctly and only letting the right people use them.
Programming
Writing instructions for a computer to do things like automate tasks, check web traffic, and find suspicious activity.
Security Information and Event Management (SIEM) Tools
Tools that gather and study log data—like strange logins—to help find and understand security problems.
Intrusion detection systems (IDSs)
Watch what’s happening on a system and warn analysts if someone breaks in or does something bad.
Threat Landscape Knowledge
Keeping up with new attack methods so security teams can spot threats and improve protection.
Incident Response
Steps taken after a security problem happens.
Personally Identifiable Information (PII)
Info that can be used to figure out who someone is.
Sensitive Personally Identifiable Information (SPII)
A special kind of personal info that needs extra protection.