Terminology Flashcards

1
Q

Define compliance

A

Compliance is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define security frameworks

A

Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Security Controls

A

Security controls are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Security posture

A

Security posture is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a treat factor

A

A threat factor, or malicious attacker, is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define an internal threat

A

An internal threat can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Network security

A

Network security is the practice of keeping an organization’s network infrastructure secure from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Cloud security

A

Cloud security is the process of ensuring that assets stores in the clod are properly configures, or set up correctly, and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define SIEM Tools

A

Security Information and Event Managements Tools are software solutions designed to provide a centralized view of an organization’s IT security by collecting, analyzing, and managing data from multiple sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define PII

A

Personally Indentifiable Information is any information used to infer an individual’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define SPII

A

Sensitive PII - this term is used in data privacy and refers to personal information that, if exposed, can lead to identity theft or other forms of harm. Examples of SPII include social security numbers, financial account number, medical records, and biometric data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Phishing

A

Phishing is the use of digital communications to trick people into revealing sensitive data or deploying malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Malware

A

Malware is software designed to harm devices or networks. Their primary purpose is to obtain money, or in some cases, an intelligence advantage that can be used against a person, an organization, or a territory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Social Engineering

A

Social Engineering is a manipulation that exploits human error to gain private information, access, or valuables. Human error is usually a result of trusting someone without question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List common attack types

A

Phishing, Malware and Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly