Module 1: The Cybersecurity Industry Flashcards
Cybersecurity
“The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information” —Cybersecurity and Infrastructure Security Agency (2019)
CIA
Stands for Confidentiality, Integrity, and Availability, representing the fundamental principles to ensure data and systems are protected from unauthorized access, tampering, and downtime.
Regulations and compliance laws
Refer to the legal and industry-specific rules and standards that organizations must follow to protect sensitive information, maintain data privacy, and mitigate cyber risks.
Blue team
A security team responsible for maintaining overall system security, preventing security breaches, monitoring potential threats, and researching security technology; typically responsible for finding and implementing security controls to strengthen the CIA triad.
Red team
An organizational security team responsible for providing security assessments outlining an organization’s system defense efficacy and resilience; uses penetration testing tools to search for weaknesses and vulnerabilities.
Cybersecurity engineer
Keeps computer information systems secure and controls access to systems based on user classifications.
Cyberseek
Website that provides details on cybersecurity-related positions in the US job market.
Defensive cybersecurity analyst
Researches and evaluates security threats and products; recommends improvements to organizational cyber defense.
Digital forensic investigator
Gathers digital information evidence and trails in the systems to determine how cybercrimes were committed.
Ethical hacker
Hired by organizations to legally hack into their networks and identify weak entry points.
Incident detection engineer
Replicates real threats to understand how they operate and how to neutralize them.
IT auditor
Assesses technology for potential security, efficiency, and compliance issues.
Network security administrator
Responsible for the management and monitoring of organizational network security.
Security operations center (SOC) analyst
Monitors and manages networks; works with intrusion detection/prevention systems.
Vulnerability assessment analyst
Hunts for critical flaws and vulnerabilities in networks, often as a third-party consultant.