Module 1 - Lesson 1 Flashcards
What are the three key principles of information security?
Confidentiality, integrity, and availability.
Define a threat actor.
Any person or group who presents a security risk.
What is an internal threat?
A threat that comes from current or former employees, external vendors, or trusted partners.
What is the role of security teams in an organization?
Maintain and improve business productivity and ensure regulatory compliance.
List some job titles for cybersecurity professionals.
- Security analyst or specialist
- Cybersecurity analyst or specialist
- SOC analyst
- Information security analyst
What are the three primary responsibilities of an entry-level cybersecurity analyst?
- Protecting computer and network systems
- Penetration testing or ethical hacking
- Proactively preventing threats
What is the difference between an analyst and an engineer in cybersecurity?
Analysts are more concerned with operations; engineers focus on project work.
What is a playbook in cybersecurity?
A list of procedures for investigating certain detections.
Define compliance in the context of cybersecurity.
The process of adhering to internal standards and external regulations.
What are security frameworks?
Guidelines used for building plans to mitigate risks and threats.
What are security controls?
Safeguards designed to reduce specific security risks.
What is security posture?
An organization’s ability to manage its defense of critical assets and data.
What is network security?
The practice of keeping an organization’s network infrastructure secure from unauthorized access.
What does cloud security ensure?
That assets stored in the cloud are properly configured and access is limited to authorized users.
What is the purpose of performing security audits?
To review an organization’s security records, activities, and related documents.
What is programming in the context of cybersecurity?
The process of creating specific instructions for a computer to execute tasks.
List some core transferable skills needed in cybersecurity.
- Communication skills
- Collaboration
- Problem-solving
- Time management
- Growth mindset
What technical skills are important for cybersecurity professionals?
- Understanding programming languages
- Using SIEM tools
- Computer forensics
- Knowledge of IDSs
- Incident response
What certification does the Google Cybersecurity Certificate help prepare you for?
CompTIA Security+.
What is personally identifiable information (PII)?
Any information used to infer an individual’s identity.
Define sensitive personally identifiable information (SPII).
A specific type of PII that falls under stricter handling guidelines.
What is malware?
Software designed to harm devices or networks.
What is a computer virus?
Malicious code written to interfere with computer operations.
What is a worm in cybersecurity?
A type of computer virus that can duplicate and spread on its own.