Module 1: The Cybersecurity Industry Flashcards

1
Q

Cybersecurity

A

“The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information” —Cybersecurity and Infrastructure Security Agency (2019)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA

A

Stands for Confidentiality, Integrity, and Availability, representing the fundamental principles to ensure data and systems are protected from unauthorized access, tampering, and downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Regulations and compliance laws

A

Refer to the legal and industry-specific rules and standards that organizations must follow to protect sensitive information, maintain data privacy, and mitigate cyber risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blue team

A

A security team responsible for maintaining overall system security, preventing security breaches, monitoring potential threats, and researching security technology; typically responsible for finding and implementing security controls to strengthen the CIA triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Red team

A

An organizational security team responsible for providing security assessments outlining an organization’s system defense efficacy and resilience; uses penetration testing tools to search for weaknesses and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cybersecurity engineer

A

Keeps computer information systems secure and controls access to systems based on user classifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyberseek

A

Website that provides details on cybersecurity-related positions in the US job market.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Defensive cybersecurity analyst

A

Researches and evaluates security threats and products; recommends improvements to organizational cyber defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital forensic investigator

A

Gathers digital information evidence and trails in the systems to determine how cybercrimes were committed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ethical hacker

A

Hired by organizations to legally hack into their networks and identify weak entry points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident detection engineer

A

Replicates real threats to understand how they operate and how to neutralize them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IT auditor

A

Assesses technology for potential security, efficiency, and compliance issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network security administrator

A

Responsible for the management and monitoring of organizational network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security operations center (SOC) analyst

A

Monitors and manages networks; works with intrusion detection/prevention systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vulnerability assessment analyst

A

Hunts for critical flaws and vulnerabilities in networks, often as a third-party consultant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Chief Information Security Officer (CISO)

A

A senior executive responsible for overseeing and implementing an organization’s information security strategy to protect against cyber threats and ensure data confidentiality, integrity, and availability.