Common Cybersecurity Terms Flashcards

Understanding the common terms used in module 1 of the Google Cybersecurity Certification Course.

1
Q

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

A

Cybersecurity (Or Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The guidelines used for building plans to help mitigate risks and threats to data and privacy.

A

Security Frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

A

Security Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organizations ability to manage its defense of critical assets and data and react to change. A strong _________ ___________ leads to lower risk for the organization.

A

Security Posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A malicious attacker, any person or group who presents a security risk. The risk can relate to computers, applications, networks, and data.

A

Threat Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A current or former employee, external vendor, or a trusted partner who poses a security risk. Oftentimes accidental, but can be intentional.

A

Internal Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The practice of keeping an organizations network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of ensuring assets stored in the ______ are properly configured, or set up correctly, and access to those assets is limited to authorized users. The ________ is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet. _____ _______ is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the _________.

A

Cloud, Cloud Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A process that can be used to create a specific set of instructions for a computer to execute tasks.

A

Programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly