Foundations of Cyber Security-Week One Key Terms Flashcards
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
Cyber Security (Security)
A-Focuses on monitoring networks for breaches
B-help develop strategies to secure an organization and research information technology (IT) security trends to remain alert and informed about potential threats.
C-Works to prevent incidents
Cyber Security Analysts/ Security Analysts
the process of adhering to internal standards and external regulations, and enables organizations to avoid fines and security breaches.
COMPLIANCE
guidelines used for building plans to help mitigate risks and threats to data and privacy
SECURITY FRAMEWORKS
used with security frameworks to establish a strong security posture
safeguards designed to reduce specific security risks.
SECURITY CONTROLS
STRONG _________leads to lower risk for the organization.
organization’s ability to manage its defense of critical assets and data and react to change
SECURITY POSTURE
-Any person or group who presents a security risk.
- Risk can be related to computers, applications, networks, and data.
Threat actor or Malicious attacker
At times _______ threats are accidents.
Can be a current or former employee, an external vendor, or a trusted partner who poses a security risk.
Other times, the __________ _______ actors intentionally engage in risky activities, such as unauthorized data access.
Internal Threats
practice of keeping an organization’s network infrastructure secure from unauthorized access.
Includes data, services, systems, and devices that are stored in an organization’s network.
NETWORK SECURITY
a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.
The ________ is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet
the process of ensuring that assets stored in the ______ are properly configured, or set up correctly, and access to those assets is limited to authorized users.
CLOUD /CLOUD SECURITY
A process that can be used to create a specific set of instructions for a computer to execute tasks.
PROGRAMMING
skills from other areas of study or practice that can apply to different careers
TRANSFERABLE SKILLS
apply to several professions, as well; however, they typically require knowledge of specific tools, procedures, and policies.
Technical Skills
use of digital communications to trick people into revealing sensitive data or deploying malicious software.
Phishing