Module 1 - 01-1 Flashcards

Introduction to Cybersecurity

1
Q

Define Cybersecurity (or security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybersecurity is the practice of ensuring ___ . (3)

A

Confidentiality, Integrity, and Availability of Information are ensured through the effective practice of security. This involves protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Benefits of Security (5)?

A
  • Protects against External and Internal Threats
  • Meets Regulatory Compliance (laws or guidelines)
  • Maintains and Improve Business Productivity
  • Reduce Expenses
  • Maintains Brand Trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Threat

A

Any circumstance or event that can negatively impact assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define External Threat

A

Someone outside of the organization trying to gain access to private information, networks or devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Internal Threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Common Job Titles for Security positions (6)?

A
  • Security analyst or specialist
  • Cybersecurity analyst or specialist
  • Security operation center or SOC analyst
  • Information security analyst
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Security Analysts responsible for?

A

Security analysts are responsible for monitoring and protecting information and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Three primary responsibilities of a security analyst?

A

Protecting computer and network systems
Install prevention software
Conducting periodic security audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Security Audit

A

A review of an organization’s security records, activities, and other related documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Compliance

A

The process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Security Framework

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Security controls

A

Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Security Posture

A

An organization’s ability to manage its defense of critical assets and data and react to change.

A strong security posture leads to lower risk for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Threat Actor
(or malicious attacker)

A

Any person or group who presents a security risk.
This risk can relate to computers, applications, networks, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Network Security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access.
This includes data, services, systems, and devices that are stored in an organization’s network.

17
Q

Define Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users.

18
Q

Define Programming

A

A process that can be used to create a specific set of instructions for a computer to execute tasks.

19
Q

What are examples of programming tasks (3)?

A
  • Automation of repetitive tasks (e.g., searching a list of malicious domains)
  • Reviewing web traffic
  • Alerting suspicious activity
20
Q

What are the primary responsibilities of an entry-level security analyst (3)?

A
  • Monitor systems
  • Protect information
  • Search for weaknesses
21
Q

Cybersecurity is the practice of ensuring _____ by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

  • customer trust, increased revenue, and advancement
  • confidentiality, integrity, and availability of information
  • continuity, infrastructure, and attainment of business goals
  • compliance, instructions, and accuracy
A

confidentiality, integrity, and availability of information

22
Q

What are the primary responsibilities of an entry-level security analyst? Select three answers.

  • Monitor systems
  • Protect information
  • Search for weaknesses
  • Create compliance laws
A
  • Monitor systems
  • Protect information
  • Search for weaknesses

The primary responsibilities of an entry-level security analyst are as follows: Monitor systems, protect information, and search for weaknesses.

23
Q

Performing _____ enables security professionals to review an organization’s security records, activities, and related documents.

  • security audits
  • ethical hacking
  • penetration tests
  • software developments
A

security audits

24
Q

In what ways do security teams bring value to an organization? Select two answers.

  • Achieving regulatory compliance
  • Increasing operational expenses
  • Reducing business productivity
  • Protecting against external and internal threats
A

Achieving regulatory compliance
Protecting against external and internal threats

Achieving regulatory compliance and protecting against external and internal threats are ways that security teams bring value to an organization.