Course 1 Flashcards
(38 cards)
What is Cybersecurity?
The practice of ensuring confidentiality, integrity, and availability (CIA) of information by protecting networks, devices, and data from unauthorized access or exploitation.
List the benefits of Cybersecurity.
- Protects against internal/external threats
- Meets regulatory compliance
- Maintains or improves business productivity
- Reduces expenses
What are common job roles in Cybersecurity?
- Security Analyst/Specialist
- Cybersecurity Analyst/Specialist
- Security Operations Center (SOC) Analyst
- Information Security Analyst
What are the responsibilities of a Security Analyst?
- Protecting systems/networks
- Installing prevention software
- Conducting security audits
Define Threat Actor.
A person/group posing a cybersecurity threat by attempting to breach systems, steal data, or cause harm.
What is an Internal Threat?
A security risk originating from inside an organization, often by employees or partners—either unintentionally or deliberately.
What is Network Security?
The process of protecting a computer network from intrusions, misuse, or unauthorized access.
What is Cloud Security?
Securing data, applications, and services hosted in the cloud. Ensures only authorized users access the data.
What are Security Frameworks?
Structured guidelines organizations use to create policies and practices that reduce cyber risks.
What are Security Controls?
Specific protective actions (like firewalls or multi-factor authentication) used to counter threats.
Define Security Posture.
A measure of an organization’s overall cybersecurity strength and preparedness.
What does Compliance entail in Cybersecurity?
Meeting external regulations (like GDPR, HIPAA) and internal policies to ensure legal and secure operations.
What are the components of the CIA Triad?
- Confidentiality
- Integrity
- Availability
List transferable skills necessary for Cybersecurity Analysts.
- Communication
- Collaboration
- Problem-solving
- Time management
- Growth mindset
- Respect for diversity
What are some technical skills for Cybersecurity Analysts?
- Programming languages
- SIEM tools
- Computer forensics
- IDS (Intrusion Detection Systems)
- Threat landscape knowledge
- Incident response
Define Malware.
Malicious software that harms systems or steals data.
What are the types of Malware?
- Viruses
- Worms
- Ransomware
- Spyware
What is Phishing?
Deceptive messages tricking users into revealing personal information.
What are the types of Phishing?
- BEC
- Spear Phishing
- Whaling
- Vishing
- Smishing
What is Social Engineering?
Manipulating people to reveal confidential information.
List key principles of Social Engineering.
- Authority
- Intimidation
- Consensus
- Scarcity
- Familiarity/Trust
- Urgency
What is the NIST Cybersecurity Framework (CSF)?
A widely used standard for managing and reducing cybersecurity risk.
What does NIST RMF stand for?
NIST Risk Management Framework.
What are CIS Controls?
A set of prioritized actions that improve security.