Module 1 Flashcards

1
Q

What is Cybersecurity (Security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people and data from unauthorized access or criminal exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Protecting data from unauthorized changes or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

Limiting access to sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internal Threat

A

A current or former employee, external vendor, or trusted partner who posses a security threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Personally Identifiable Information (PII)

A

Any information used to inform an individual’s identify such as name, email, address and phone number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Assets

A

Any valuable piece of data, device, or system within an organization that needs to be protected from cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cyber

A

Of or relating to or involving computers, information technology or virtual reality.

Issue of complexity between technologies, individuals and organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sensitive Personally Identifiable Information

A

A specific type of PII that falls under stricter handling guidelines such as social security numbers, and medical records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical Skills

A

Skills that require knowledge of specific tools, procedures and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat

A

Any circumstance or event that can negatively impact assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Actor

A

A person or group who presents a security threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transferable skills

A

Skills from other areas that can apply to different careers such as team work, communication, problem solving and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly