Module 1 Flashcards

1
Q

Cybersecurity(security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Actor

A

Any person or group who presents a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Benefits of Security

A

Protects against external and internal threats

Meets regulatory compliance

Maintains and improves business productivity

Reduces expenses

Maintains brand trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common Job Titles

A

Security analyst or specialist

Cybersecurity analyst or specialist

Security operations center (SOC) analyst

Information security analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Analyst Responsibilities

A

Protecting computer and network systems

Installing prevention software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compliance

A

The process of adhering to internal standards, external regulations and enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Frameworks

A

Guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Controls

A

Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Posture

A

An organization’s ability to manage its defense of critical assets, data, and react to change. A strong security posture leads to lower risk for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internal Threat

A

A current or former employee, an external vendor, or a trusted partner who poses a security risk. At times an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor intentionally engages in risky activities, such as unauthorized data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Security

A

The practice of keeping an organizations network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organizations network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud

A

A network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Programming

A

A process that can be used to create a specific set of instructions for a computer to execute tasks. For example, automation of repetitive tasks, reviewing web traffic, and alerting suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Analyst Transferable Skills

A

Communication

Collaboration

Analysis

Problem Solving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Analyst Technical Skills

A

Programming languages

Security information and event management (SIEM) tools

Computer forensics

17
Q

Transferable Skills

A

Communication

Problem-solving

Time management

Growth mindset

Diverse perspectives

18
Q

Technical Skills

A

Programming languages

Security information and event management (SIEM) tools

Intrusion detection systems (IDSs)

Threat landscape knowledge

Incident response

19
Q

Programming languages

A

By understanding how to use programming languages cyber security analyst can automate tasks that would otherwise be very time-consuming. Examples of task that programming can be used for include searching data to identify potential threats or organizing and analyzing information to identify patterns related to security issues.

20
Q

Security information and event management (SIEM) tools

A

SIEM tools, collect an analyzed log data, or records of events such as unusual login behavior, and support analysts’ ability to monitor critical activities in an organization. This helps cyber security professionals, identify and analyze, potential security, threats, risks, and vulnerability more efficiently.

21
Q

Intrusion detection systems (IDSs)

A

Cyber security analyst use IDSs to monitor system activity and alerts for possible intrusions. It’s important to become familiar with IDSs because they are a key tool that every organization uses to protect assets and data. For example, you might use an IDS to monitor networks for signs of malicious activity, like unauthorized access to network.

22
Q

Threat Landscape Knowledge

A

Being aware of current trends related to thread actors, malware, or threat methodologies is vital. This knowledge allows security teams to build stronger defenses against thread act, tactics and techniques. By staying up-to-date on attack, trends and patterns, security professionals are better able to recognize when new types of threats emerge, such as a new ransomware variant.

23
Q

Incident Response

A

Cyber security analyst need to be able to follow established policies and procedures to respond to incidents appropriately. For example, a security analyst might receive an alert about a possible malware attack, then follow the organizations outline procedures to start the incident response process. This could involve conducting an investigation to identify the root issue and establishing ways to remediate it.

24
Q

Personally Identifiable Information (PII)

A

Any information used to infer an individual’s identity

25
Q

Sensitive Personally Identifiable Information (SPII)

A

A specific type of PII that falls under stricter handling guidelines