Definitions Flashcards

(31 cards)

1
Q

Cybersecurity

A

the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat actor

A

(malicious actor) person or group that presents a security risk; risk can be to computers, applications, networks, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transferable Skills

A

skills from other areas that can apply to different careers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Playbook

A

reference guide for certain detections and how to investigate incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Technical Skills

A

skills that require knowledge of specific tools, procedures, and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Personally Identifiable Information (PII)

A

information used to infer an individual’s identity; full name, date of birth, physical address, phone number, email address, IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sensitive Personally Identifiable Information (SPII)

A

stricter handling guidelines of information used to infer an individual’s identity; social security number, medical information, financial (bank) information, and biometric data (facial recognition)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identity theft

A

act of stealing PII/SPII to commit fraud while impersonating a victim; for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

5 Benefits of Security

A
  1. Protects against external and internal threats
  2. Meets regulatory compliance
  3. Maintains and improves business productivity
  4. Reduces expenses
  5. Maintains brand trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Common Job Titles

A
  1. Security analyst/specialist
  2. Cybersecurity analyst/specialist
  3. Security operations center (SOC) analyst
  4. Information security analyst
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Analyst Responsiblities

A

Responsible for monitoring and protecting information and system. This includes protecting computer and software systems, installing prevention software, and conducting periodic security audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operations

A

responding to detections and doing investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Projects

A

working with other teams to build new detections or improve the current ones (mostly engineers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compliance

A

process of adhering to internal standards as well as external regulations and enables organizations to avoid fines and security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security frameworks

A

guidelines used for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security controls

A

safeguards used to reduce specific security risks; used with security frameworks to bolster security posture

16
Q

Internal Threat

A

can be current or former employee, an external vendor, or a trusted partner who poses a security risk

17
Q

Accidental Threat

A

employee accidentally clicks on a malicious email link

18
Q

Network security

A

practice of keeping an organization’s network infrastructure secure from unauthorized access from data, services, systems, and devices that are stored in an organization’s network

19
Q

Cloud security

A

process of ensuring that assets stored in the cloud are properly configured and limited to authorized users

20
Q

The cloud

A

a network made up of a collection of servers via the internet

21
Q

Programming

A

process that can be used to create a specific set of instructions for a computer to execute tasks; automation of repetitive tasks (searching malicious domains), reviewing web traffic, and/or alerting suspicious activity

22
Q

Transferable Analyst Skills

A
  1. Communication
  2. Collaboration
  3. Problem-solving
    4.Time management
  4. Growth mindset
  5. Diverse perspectives (inclusive)
23
Q

Technical Analyst Skills

A
  1. Programming languages
  2. Security information and event management (SIEM) tools
  3. Intrusion detection systems (IDSs)
  4. Computer forensics
  5. Threat landscape knowledge
  6. Incident response
24
Programming Languages
used to automate tasks and identify error messages
25
SIEM tools
used to identify and analyze security threats, risks and vulnerabilities more efficiently; preventative action against cyber attacks
26
IDSs
used to monitor system activity and alerts for possible intrusions; only detect and report events
27
Digital forensic investigators
attempt to identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices
28
Threat landscape knowledge
up to date on trends related to threat actors, malware, or threat methodologies
29
Incident response
ability to detect and act upon a security threat
30