Module One Flashcards
Cybersecurity
practice of ensuring confidentiality, integrity, and availability of info by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Compliance
adhering to internal standards and external regulations, enables orgs to avoid fines and security breaches
Security Frameworks
guidelines for building plans to help mitigate risks and threats to data and privacy
Security Controls
safeguards to reduce specific security risks, used with security frameworks to est strong security posture
Security Posture
orgs ability to manage defense of critical assets and data and react to change, leads to lower risk for org
Threat Actor
malicious attacker, person or group who presents a security risk, can relate to computers, apps, networks, and data
Internal threat
current or former employee, external vendor, or trusted partner who poses security risk, which can be accidental
Network Security
practice of keeping orgs network infrastructure secure from unauthorized access. Includes data, services, systems, devices that are stored in orgs network
cloud security
process of ensuring that assets stored in the cloud are properly configured, and access to those assets is limited to authorized users.
The Cloud Network
made up of collection of servers or computers that store resources and data in remote physical locations known as data centers, accessed via the internet
Programming
process that can be used to create specific set of instructions for a computer to execute tasks
Transferable Skills
communication
problem-solving
time management
growth mindset
diverse perspectives
SIEM tools
security info and event management tools
collect and analyze log data (ex: unusual login behavior), support ability to monitor critical activities
IDSs
Intrusion detection systems
use to monitor system activity and alerts for possible intrusions
(ex: use to monitor networks for signs of malicious activity, like unauthorized access to a network)
Threat landscape knowledge
being aware of current trends related to threat actors, malware, or threat methodologies