Intro To CyberSecurity Mod 3 Flashcards
Asset:
An item perceived as having value to an organization
Availability:
The idea that data is accessible to those who are authorized to access it
Compliance:
The process of adhering to internal standards and external regulations
Confidentiality:
The idea that only authorized users can access specific assets or data
What is the C.I.A Triad?
A model that helps inform how organizations consider risk when setting up systems and security policies. Confidentiality, Integrity and Avalability.
Hacktivist
A person who uses hacking to achieve a political goal
Integrity:
The idea that the data is correct, authentic, and reliable
National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF):
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
Security architecture:
A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats
Security controls:
afeguards designed to reduce specific security risks
Security ethics:
Guidelines for making appropriate decisions as a security professional
Security frameworks:
Guidelines used for building plans to help mitigate risk and threats to data and privacy
Security governance:
Practices that help support, define, and direct security efforts of an organization
Intrusion detection system (IDS):
An application that monitors system activity and
alerts on possible intrusions
Log:
A record of events that occur within an organization’s systems
Linux:
An open-source operating system
Network protocol analyzer (packet snifer):
A tool designed to capture and analyze data traffic within networks.
Open Web Application Security Project (OWASP):
A non-proft organization
focused on improving soware security
SQL (Structured Query Language):
A programming language used to create, interact
with, and request information from a database