Course 1, Week 1 Flashcards
Cybersecurity
The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
Cloud Security
The practice of protecting cloud-based data, applications and infrastructure from cyber attacks and threats.
Internal Threat
A security risk that originates from within the targeted organization.
Network Security
Protects your network and data from breaches, intrusions and other threats.
Personally Identifiable Information (PII)
Any data that could potentially identify a specific individual.
Security Posture
An organization’s ability to protect its networks, information, and systems from threats.
Sensitive Personally Identifiable Information (SPII)
A subset of PII, if lost, compromised, or disclosed without authorization, could result in substantial harm, embarrassment, inconvenience, or unfairness to an individual.
Technical Skills
A subset of hard skills, which are the knowledge or abilities needed to perform specific tasks.
Threat
A malicious act that seeks to damage data, steal data, or disrupt digital life in general.
Threat Actor
Individuals or groups that intentionally cause harm to digital devices or systems.
Transferable Skills
Skills you can transfer from one job to another.
Adversarial Artificial Intelligence (AI)
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently.
Business Email Compromise (BEC)
A spear phishing email scam that attempts to steal money or sensitive data from a business.
Phishing
A type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
Computer Code
Malicious code designed to cause damage, security breaches or other threats to application security.