terms Flashcards

1
Q

n

protect organizations, individuals, or networks from digital attacks, thefts, or damage.

A

Cybersecurity

/ˌsaɪ.bɚ.səˈkjʊr.ə.t̬i/

Cybersecurity jobs are very high demand careers in 2024.
(In 1989, according to Gizmodo, a word entered the English lexicon: cybersecurity.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

N. job title

responsible for protecting computers and data from online threats

A

“Cybersecurity Analyst”

As organizations worldwide increasingly transfer to digital systems, many organizations need trained cybersecurity professionals to help ensure the security of their information and systems. The cybersecurity skills you learn in this program will qualify you for an entry-level role as a Cybersecurity Analyst. Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

N. Job title

protect a company’s electronic data and ensure computer systems aren’t vulnerable to attacks.

A

“information security analyst”

According to the US Bureau of Labor Statistics, the employment rate is expected to grow 35 percent for information security analysts throughout 2031, primarily as workers retire or leave the workforce for other reasons. Link fact check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information security vs. cybersecurity

Information security is often confused with cybersecurity—which is understandable, because there is significant overlap, and many use the two interchangeably.
…….1 , however, refers more broadly to preventing cyberattacks that come from unauthorized electronic sources.
……….2 focuses specifically on protecting the data and information of an organization, employees, or users, which can exist in both physical and electronic form. ……2 also means making sure data is accessible to those who are authorized to use it.

A

1- Cybersecurity
2- Information security

link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

abbreviation

SOC stands for

A

security operations center (SOC)
is to monitor, prevent, detect, investigate, and respond to cyber threats around the clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

N - Job title

“Who designs and plans the security systems to protect computers and networks?”

A

“Security Architect”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

according to NIST

The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

A

information security

Abbreviations: INFOSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST stands for?

A

** National Institute of Standards and Technology**

## Footnote

a federal agency within the U.S. Department of Commerce. NIST’s mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. [Link](https://www.nist.gov/)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Abbreviations

CIA Triad stands for?

A

confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

n - Based on NIST

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

A

confidentiality

/ˌkɑːn.fə.den.ʃiˈæl.ə.t̬i/

confidentiality which is similar or equivalent to privacy. For confidentiality access to resources or data must be restricted to only authorized subjects or entities. Data encryption is a common method of ensuring confidentiality. LINK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

n - Based on NIST

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.

A

integrity

Integrity involves maintaining the consistency and accuracy of data over its entire life cycle. Data must not be changed in transit, for example, when it is sent over the Internet or using a local area network. And steps must be taken to ensure that no one or an unauthorized person or subject makes any changes to our data, so it cannot be altered by unauthorized people. It is very common to use hash values for data integrity verification, for example, when you download a new operating system from the Internet. One of the first things to do once the download is ready is to compare the hash values that there are provided by the author of the operating system and the hash value of the down loaded file. They must match to make sure that the integrity is accurate. LINK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

n - Based on NIST

Ensuring timely and reliable access to and use of information.

A

availability

Ensuring availability requires maintenance and upgrading of hardware and software and operating system environments. So basically it is about keeping the business operations up and running, firewalls, proxies, computers everything has to be up and running 24 by 7, 365 days. Now business continuity plans, disaster recovery, redundancy, all those are best practices consider for availability to guarantee that the business is always running. LINK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Based on NIST:

Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.

A

cybersecurity

/ˌsaɪ.bɚ.səˈkjʊr.ə.t̬i/

Abbreviations / Acronyms / Synonyms:
computer security (COMPUSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a flaw, loophole, oversight, or error that can be exploited to violate system security policy.

A

vulnerability

/ˌvʌl.nɚ.əˈbɪl.ə.t̬i/

For example, a software or an application that has code vulnerable to a buffer or flow exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

an event, natural or man-made, able to cause negative impact to an organization.

A

threat

/θret/

Threat could be a storm or a hurricane or a hacker, for instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a defined way to breach the security of an IT system through a vulnerability.

A

exploit

/ɪkˈsplɔɪt/

An exploit could be a piece of code available on the internet to execute such attack against an application that happens to be vulnerable.

17
Q

the probability of an event or that an event could actually happen. In this case, the likelihood of a vulnerability to be exploited.

A

risk

/rɪsk/

18
Q

based on NIST

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

A

vulnerability

/ˌvʌl.nɚ.əˈbɪl.ə.t̬i/

19
Q

based on NIST

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

A

threat

/θret/

Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.

20
Q

based on NIST

A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence.

A

risk

/rɪsk/

21
Q

the threat of a malicious attack by an individual or organization attempting to gain access to a computer network, corrupt data, or steal confidential information.LINK

A

(Cyber)security threat

PICTURE LINK

22
Q

The protection of information in all of its forms, wherever it may exist, through the application of good security practices.LINK

A

cybersecurity

/ˌsaɪ.bɚ.səˈkjʊr.ə.t̬i/

23
Q

the protection of the confidentiality, integrity and availability of information, whether in transmission, processing or storage, through the application of policy, training and awareness and technology.

A

cybersecurity

/ˌsaɪ.bɚ.səˈkjʊr.ə.t̬i/

24
Q

n

In cybersecurity ———- is the probability of loss, damage, destruction or disclosure of an information asset.

A

Risk