Terms Flashcards
Compliance
Is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches
Security Frameworks
Are guidelines used for building plans to help mitigate risks and threats to data and privacy
Security Controls
Are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture
Security Posture
Is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization
Threat Actor
Is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data. Also known as a malicious attacker.
Internal Threat
A current or former employee, external vendor, or trusted partner who poses a security risk
Network Security
Is the practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network
Cloud Security
The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users
Programming
Is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include:
-Automation of repetitive tasks (e.g., searching a list of malicious domains)
-Reviewing web traffic
-Alerting suspicious activity
Transferable skills (There are 5 of them)
Skills from other areas that can apply to different careers
-Communication
-Problem-solving
-Time management
-Growth mindset
-Diverse perspectives
Communication
As a cybersecurity analyst, you will need to communicate and collaborate with others. Understanding others’ questions or concerns and communicating information clearly to individuals with technical and non-technical knowledge will help you mitigate security issues quickly
Problem-solving
One of your main tasks as a cybersecurity analyst will be to proactively identify and solve problems. You can do this by recognizing attack patterns, then determining the most efficient solution to minimize risk. Don’t be afraid to take risks, and try new things. Also, understand that it’s rare to find a perfect solution to a problem. You’ll likely need to compromise.
Time management
Having a heightened sense of urgency and prioritizing tasks appropriately is essential in the cybersecurity field. So, effective time management will help you minimize potential damage and risk to critical assets and data. Additionally, it will be important to prioritize tasks and stay focused on the most urgent issue
Growth mindset
This is an evolving industry, so an important transferable skill is a willingness to learn. Technology moves fast, and that’s a great thing! It doesn’t mean you will need to learn it all, but it does mean that you’ll need to continue to learn throughout your career. Fortunately, you will be able to apply much of what you learn in this program to your ongoing professional development
Diverse perspectives
The only way to go far is together. By having respect for each other and encouraging diverse perspectives and mutual respect, you’ll undoubtedly find multiple and better solutions to security problems.