Foundations Of Cybersecurity Flashcards
Cybersecurity
The practice of ensuring confidentiality, integrity and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Threat Actor
Any person or group who presents a security risk
Playbook
A list of how to go through a certain detection, and what the analyst needs to look at in order to investigate those incidents
Compliance
The process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches
Security Frameworks
Guidelines used for building plans to help mitigate risks and threats to data and privacy
Security Controls
Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture
Security Posture
An organizations ability to manage its defense of critical assets and data and react to change.
Internal Threat
A current or former employee, an external vendor or a trusted partner who poses a security risk.
Network Security
The practice of keeping an organizations network infrastructure secure from unauthorized access.
Cloud Security
The process of ensuring that assets stored in the cloud are properly configured or set up correctly, and access to those assets is limited to authorized users.
Cloud
A network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet.
Programming
A process that can be used to create a specific set of instructions for a computer to execute tasks.
Transferable Skills
Communication, collaboration, analysis and problem solving
Technical Skills
Programming languages, Security Information and Event Management (SIEM) tools, and computer forensics
Security Information and Event Management (SIEM) Tools
Tools which collect and analyze log data or records of events such as unusual login behavior and support analysts ability to monitor critical activities in an organization.
Intrusion Detection Systems (IDSs)
Used to monitor system activity and alerts for possible intrusions.
Personally Identifiable Information (PII)
Any information used to infer an individuals identity. (Ex- full name, D.O.B., address, phone number, email, IP)
Sensitive Personally Identifiable Information (SPII)
A specific type of PII that falls under stricter handling guidelines. (Ex- SSN, medical or financial information, biometric data)
Computer Virus
Malicious code written to interfere with computer operations and cause damage to data and software.
Malware
Software designed to harm devices or network.
Social Engineering
A manipulation technique that exploits human error to gain private information, access, or valuables.
Phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software.
CSIRTs
Computer Security Incident Response Teams
Business Email Compromise (BEC)
A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information in order to obtain a financial advantage.
Spear Phishing
A malicious email attack that targets a specific user or group of users.
Whaling
A form of spear phishing. Threat actors target company executives to gain access to sensitive data.
Vishing
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.
Smishing
The use of text messages to trick users in order to obtain sensitive information or to impersonate a known source.
Worms
Malware that can duplicate and spread itself across system on its own.
Ransomware
A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.
Spyware
Malware that’s used to gather and sell information without consent.
Social Media Phishing
A threat actor collects detailed information about their target from social media sites.
Watering Hole Attack
A threat actor attacks a website frequently visited by a specific group of users.
USB Baiting
A threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network.
Physical Social Engineering
A threat actor impersonates an employee, customer or vendor to obtain unauthorized access to a physical location.
Reasons Social Engineering Is Effective
Authority, intimidation, consensus/ social proof, scarcity, familiarity, trust or urgency
CISSP
Certified Information Systems Security Professional