Module One Flashcards

1
Q

Cybersecurity

A

practice of ensuring confidentiality, integrity, and availability of info by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compliance

A

adhering to internal standards and external regulations, enables orgs to avoid fines and security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Frameworks

A

guidelines for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Controls

A

safeguards to reduce specific security risks, used with security frameworks to est strong security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Posture

A

orgs ability to manage defense of critical assets and data and react to change, leads to lower risk for org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat Actor

A

malicious attacker, person or group who presents a security risk, can relate to computers, apps, networks, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internal threat

A

current or former employee, external vendor, or trusted partner who poses security risk, which can be accidental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Security

A

practice of keeping orgs network infrastructure secure from unauthorized access. Includes data, services, systems, devices that are stored in orgs network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

cloud security

A

process of ensuring that assets stored in the cloud are properly configured, and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Cloud Network

A

made up of collection of servers or computers that store resources and data in remote physical locations known as data centers, accessed via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Programming

A

process that can be used to create specific set of instructions for a computer to execute tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transferable Skills

A

communication
problem-solving
time management
growth mindset
diverse perspectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SIEM tools

A

security info and event management tools
collect and analyze log data (ex: unusual login behavior), support ability to monitor critical activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDSs

A

Intrusion detection systems
use to monitor system activity and alerts for possible intrusions
(ex: use to monitor networks for signs of malicious activity, like unauthorized access to a network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat landscape knowledge

A

being aware of current trends related to threat actors, malware, or threat methodologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Incident Response

A

analysts need to follow est policies and procedures to respond to incidents

17
Q

PII

A

any info used to infer an individual’s identity (name, DOB, social, address, number, email, IP address)

18
Q

SPII

A

specific type of PII that falls under stricter handling guidelines
(ssn, medical/financial info, biometric data)