Foundations of Cyber Security Flashcards
Cybersecurity
_____ is the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Cloud Security
_____ is the process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users
Internal threat
A current or former employee, external vendor, or trusted partner who poses a security risk
Network Security
The practice of keeping an organization’s network infrastructure secure from unauthorized access
Personally identifiable information (PII)
Any information used to infer an individual’s identity
Security posture
An organization’s ability to manage its defense of critical assets and data and react to change
Sensitive personally identifiable information (SPII)
A specific type of PII that falls under stricter handling guidelines
Technical skills
Skills that require knowledge of specific tools, procedures, and policies
Threat
Any circumstance or event that can negatively impact assets
Threat actor
Any person or group who presents a security risk
Transferable skills
Skills from other areas that can apply to different careers
Adversarial artificial intelligence (AI):
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Business Email Compromise (BEC):
A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage
CISSP
Certified Information Systems Security Professional is a globally recognized and highly sought-after information security certification, awarded by the International Information Systems Security Certification Consortium
Computer Virus
Malicious code written to interfere with computer operations and cause damage to data and software
Cryptographic attack
An attack that affects secure forms of communication between a sender and intended recipient
Hacker
Any person who uses computers to gain access to computer systems, networks, or data
Malware
Software designed to harm devices or networks
Password attack
An attempt to access password secured devices, systems, networks, or data
Phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software
Physical attack
A security incident that affects not only digital but also physical environments where the incident is deployed
Physical social engineering
An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location
Social engineering
A manipulation technique that exploits human error to gain private information, access, or valuables
Social Media Phishing
A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack
Spear Phishing
A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source
Supply-Chain attack
An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed
USB baiting
An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network
Virus
refer to “computer virus”
Vishing
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
Watering hole attack
A type of attack when a threat actor compromises a website frequently visited by a specific group of users
Asset
An item perceived as having value to an organization
Availability
The idea that data is accessible to those who are authorized to access it
Compliance
The process of adhering to internal standards and external regulations
Confidentiality
The idea that only authorized users can access specific assets or data
Confidentiality, integrity, availability (CIA) triad
A model that helps inform how organizations consider risk when setting up systems and security policies
Hacktivist
A person who uses hacking to achieve a political goal
Health Insurance Portability and Accountability Act (HIPPA)
A U.S. federal law established to protect patients’ health information
Integrity
The idea that the data is correct, authentic, and reliable
National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
Privacy Protection
The act of safeguarding personal information from unauthorized use
Security architecture
A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats
Security ethics
Guidelines for making appropriate decisions as a security professional
Security controls
Safeguards designed to reduce specific security risks
Protected health information (PHI)
Information that relates to the past, present, or future physical or mental health or condition of an individual
Security frameworks
Guidelines used for building plans to help mitigate risk and threats to data and privacy
Security governance
Practices that help support, define, and direct security efforts of an organization
Sensitive personally identifiable information (SPII)
A specific type of PII that falls under stricter handling guidelines