terms Flashcards
n
protect organizations, individuals, or networks from digital attacks, thefts, or damage.
Cybersecurity
/ˌsaɪ.bɚ.səˈkjʊr.ə.t̬i/
Cybersecurity jobs are very high demand careers in 2024.
(In 1989, according to Gizmodo, a word entered the English lexicon: cybersecurity.)
N. job title
responsible for protecting computers and data from online threats
“Cybersecurity Analyst”
As organizations worldwide increasingly transfer to digital systems, many organizations need trained cybersecurity professionals to help ensure the security of their information and systems. The cybersecurity skills you learn in this program will qualify you for an entry-level role as a Cybersecurity Analyst. Link
N. Job title
protect a company’s electronic data and ensure computer systems aren’t vulnerable to attacks.
“information security analyst”
According to the US Bureau of Labor Statistics, the employment rate is expected to grow 35 percent for information security analysts throughout 2031, primarily as workers retire or leave the workforce for other reasons. Link fact check
Information security vs. cybersecurity
Information security is often confused with cybersecurity—which is understandable, because there is significant overlap, and many use the two interchangeably.
…….1 , however, refers more broadly to preventing cyberattacks that come from unauthorized electronic sources.
……….2 focuses specifically on protecting the data and information of an organization, employees, or users, which can exist in both physical and electronic form. ……2 also means making sure data is accessible to those who are authorized to use it.
1- Cybersecurity
2- Information security
link
abbreviation
SOC stands for
security operations center (SOC)
is to monitor, prevent, detect, investigate, and respond to cyber threats around the clock
N - Job title
“Who designs and plans the security systems to protect computers and networks?”
“Security Architect”
according to NIST
The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
Abbreviations: INFOSEC
NIST stands for?
** National Institute of Standards and Technology**
## Footnote
a federal agency within the U.S. Department of Commerce. NIST’s mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. [Link](https://www.nist.gov/)
Abbreviations
CIA Triad stands for?
confidentiality, integrity and availability
n - Based on NIST
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
/ˌkɑːn.fə.den.ʃiˈæl.ə.t̬i/
confidentiality which is similar or equivalent to privacy. For confidentiality access to resources or data must be restricted to only authorized subjects or entities. Data encryption is a common method of ensuring confidentiality. LINK
n - Based on NIST
Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Integrity involves maintaining the consistency and accuracy of data over its entire life cycle. Data must not be changed in transit, for example, when it is sent over the Internet or using a local area network. And steps must be taken to ensure that no one or an unauthorized person or subject makes any changes to our data, so it cannot be altered by unauthorized people. It is very common to use hash values for data integrity verification, for example, when you download a new operating system from the Internet. One of the first things to do once the download is ready is to compare the hash values that there are provided by the author of the operating system and the hash value of the down loaded file. They must match to make sure that the integrity is accurate. LINK
n - Based on NIST
Ensuring timely and reliable access to and use of information.
Ensuring availability requires maintenance and upgrading of hardware and software and operating system environments. So basically it is about keeping the business operations up and running, firewalls, proxies, computers everything has to be up and running 24 by 7, 365 days. Now business continuity plans, disaster recovery, redundancy, all those are best practices consider for availability to guarantee that the business is always running. LINK
Based on NIST:
Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
/ˌsaɪ.bɚ.səˈkjʊr.ə.t̬i/
Abbreviations / Acronyms / Synonyms:
computer security (COMPUSEC)
a flaw, loophole, oversight, or error that can be exploited to violate system security policy.
/ˌvʌl.nɚ.əˈbɪl.ə.t̬i/
For example, a software or an application that has code vulnerable to a buffer or flow exploit.
an event, natural or man-made, able to cause negative impact to an organization.