UNIT 1 Flashcards
I.D.S.
Intrusion Detection System
S.I.E.M
Security Information and Event Management
S.I.E.M
Security Information and Event Management
threat actor
is any person or group who presents a security risk
AP or GWaPA - SR
Compliance
adhereing to government and organizational standards
long “AGO standards”
Security Frameworks
guidelines to mitigate risks and threats
GM - RT
Security Controls
safeguards designed to reduce specific risks
SD… RSR
Security Posture
is an organization’s ability to manage its defense of critical assets and data and react to change
… O A - M D / C A D - react to…
Network security
Keeping network infrastructure secret from unauthorized access
knis ua
KNIS (knis like kiss) …. UA (united arabia)
Cloud Security
Ensuring cloud assets are properly configured and accessible only to authorized users.
E C A. P C A. O A U.
Programming
is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include:
-Automation of repetitive tasks (e.g., searching a list of malicious domains)
-Reviewing web traffic
-Alerting suspicious activity
Cybersecurity
Ensuring information confidentiality, integrity, and availability by protecting against unauthorized access and criminal exploitation.
EI - CIA by PA-UA and CE
PII
Personal Identifiable Information
any information used to infer an individual’s identity
SPII
Sensitive personally indentifiable information
a specific type of PII that falls under stricter handling guidelines
Technical Skills
skills that require knowledge of specific tools, procedures, and policies