Module ! Flashcards
Cybersecurity
“The art of protecting networks, devices, and data from unauthorized access
or criminal use and the practice of ensuring confidentiality, integrity, and availability of
information” —Cybersecurity and Infrastructure Security Agency (2019)
CIA
stands for Confidentiality, Integrity, and Availability, representing the fundamental
principles to ensure data and systems are protected from unauthorized access, tampering,
and downtime.
Why is cyber security important?
Global need, firewalls and antivirus software are no longer sufficient, tech development, users and system access are the biggest threat, businesses cannot properly protect themselves, compliance laws and regulations require more specific procedures.
What is a problem solver?
Problem Solver: A problem solver is someone who identifies and resolves challenges or
obstacles effectively and efficiently.
What does upskill mean?
Upskill: refers to the process of acquiring new knowledge, abilities, or certifications to
enhance one’s expertise and stay current with the evolving cybersecurity landscape.
What does Regulations and compliance laws refer to?
Regulations and compliance laws: refer to the legal and industry-specific rules and
standards that organizations must follow to protect sensitive information, maintain data
privacy, and mitigate cyber risks.
What does the Blue Team do?
Blue team: A security team responsible for maintaining overall system security, preventing
security breaches, monitoring potential threats, and researching security technology; typically
responsible for finding and implementing security controls to strengthen the CIA triad.
What does the Red team do?
Red team: An organizational security team responsible for providing security assessments
outlining an organization’s system defense efficacy and resilience; uses penetration testing
tools to search for weaknesses and vulnerabilities.
What is a Cybersecurity Engineer?
Cybersecurity engineer: Keeps computer information systems secure and controls access
to systems based on user classifications.
What is Cyberseek?
Cyberseek: Website that provides details on cybersecurity-related positions in the US job
market.
What is a Defensive cybersecurity analyst?
Defensive cybersecurity analyst: Researches and evaluates security threats and
products; recommends improvements to organizational cyber defense.
What is a Digital forensic investigator?
Digital forensic investigator: Gathers digital information evidence and trails in the systems
to determine how cybercrimes were committed.
What is an Ethical Hacker?
Ethical hacker: Hired by organizations to legally hack into their networks and identify weak
entry points.
What is an Incident detection engineer?
Incident detection engineer: Replicates real threats to understand how they operate and how to neutralize them.
What is an IT auditor?
IT auditor: Assesses technology for potential security, efficiency, and compliance issues.
What is a Network Security Administrator?
Network security administrator: Responsible for the management and monitoring of organizational network security.
What is a Security Operations (SOC) analyst?
Security operations center (SOC) analyst: Monitors and manages networks; work with
intrusion detection/prevention systems.
What is a Vulnerability assessment analyst?
Vulnerability assessment analyst: Hunts for critical flaws and vulnerabilities in networks,
often as a third-party consultant.
What is a Chief Information Security Officer (CISO)?
Chief Information Security Officer (CISO): a senior executive responsible for overseeing
and implementing an organization’s information security strategy to protect against cyber threats and ensure data confidentiality, integrity, and availability.
What is NIST?
the National Institute of Standards and Technology (NIST)
What are the benefits of cybersecurity?
Business protection against cyberattacks and data breaches.
Protection for data and networks.
Prevention of unauthorized user access.
Improved recovery time after a breach.
Protection for end users and endpoint devices.
Regulatory compliance.
Business continuity.
Improved confidence in the company’s reputation and trust for developers, partners, customers, stakeholders and employees.
What are the different types of cybersecurity threats?
Malware, Ransomware, Phishing, Social Engineering, Spear Phishing, Distributed denial of service (DDos), Advanced persistent threats (APTs), Man-in-the-middle (MitM) botnets, drive-by-download attacks, exploit kits, malvertising, vishing, credential stuffing attacks, cross-site scripting (XSS), SQL injections attacks, business email compromise (BEC), and zero day exploits.
What is Malware?
Malware is a form of malicious software in which any file or program can be used to harm a computer user. Different types of malware include worms, viruses, Trojans and spyware.
What is Ransomeware?
Ransomware is another type of malware that involves an attacker locking the victim’s computer system files – typically through encryption – and demanding a payment to decrypt and unlock them.
What is Social Engineering?
Social engineering is an attack that relies on human interaction. It tricks users into breaking security procedures to gain sensitive information that is typically protected.
What is phishing?
Phishing is a form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent. Often random attacks, the intent of these messages is to steal sensitive data, such as credit card or login information.