Module 1 Flashcards
Cybersecurity(security)
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
Threat Actor
Any person or group who presents a security risk.
Benefits of Security
Protects against external and internal threats
Meets regulatory compliance
Maintains and improves business productivity
Reduces expenses
Maintains brand trust
Common Job Titles
Security analyst or specialist
Cybersecurity analyst or specialist
Security operations center (SOC) analyst
Information security analyst
Security Analyst Responsibilities
Protecting computer and network systems
Installing prevention software
Compliance
The process of adhering to internal standards, external regulations and enables organizations to avoid fines and security breaches.
Security Frameworks
Guidelines used for building plans to help mitigate risks and threats to data and privacy.
Security Controls
Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.
Security Posture
An organization’s ability to manage its defense of critical assets, data, and react to change. A strong security posture leads to lower risk for the organization.
Internal Threat
A current or former employee, an external vendor, or a trusted partner who poses a security risk. At times an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor intentionally engages in risky activities, such as unauthorized data access.
Network Security
The practice of keeping an organizations network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organizations network.
Cloud Security
The process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users.
Cloud
A network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the Internet.
Programming
A process that can be used to create a specific set of instructions for a computer to execute tasks. For example, automation of repetitive tasks, reviewing web traffic, and alerting suspicious activity.
Security Analyst Transferable Skills
Communication
Collaboration
Analysis
Problem Solving