Foundations Of Cybersecurity Flashcards
(93 cards)
Cybersecurity
The practice of ensuring confidentiality, integrity and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Threat Actor
Any person or group who presents a security risk
Playbook
A list of how to go through a certain detection, and what the analyst needs to look at in order to investigate those incidents
Compliance
The process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches
Security Frameworks
Guidelines used for building plans to help mitigate risks and threats to data and privacy
Security Controls
Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture
Security Posture
An organizations ability to manage its defense of critical assets and data and react to change.
Internal Threat
A current or former employee, an external vendor or a trusted partner who poses a security risk.
Network Security
The practice of keeping an organizations network infrastructure secure from unauthorized access.
Cloud Security
The process of ensuring that assets stored in the cloud are properly configured or set up correctly, and access to those assets is limited to authorized users.
Cloud
A network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet.
Programming
A process that can be used to create a specific set of instructions for a computer to execute tasks.
Transferable Skills
Communication, collaboration, analysis and problem solving
Technical Skills
Programming languages, Security Information and Event Management (SIEM) tools, and computer forensics
Security Information and Event Management (SIEM) Tools
Tools which collect and analyze log data or records of events such as unusual login behavior and support analysts ability to monitor critical activities in an organization.
Intrusion Detection Systems (IDSs)
Used to monitor system activity and alerts for possible intrusions.
Personally Identifiable Information (PII)
Any information used to infer an individuals identity. (Ex- full name, D.O.B., address, phone number, email, IP)
Sensitive Personally Identifiable Information (SPII)
A specific type of PII that falls under stricter handling guidelines. (Ex- SSN, medical or financial information, biometric data)
Computer Virus
Malicious code written to interfere with computer operations and cause damage to data and software.
Malware
Software designed to harm devices or network.
Social Engineering
A manipulation technique that exploits human error to gain private information, access, or valuables.
Phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software.
CSIRTs
Computer Security Incident Response Teams
Business Email Compromise (BEC)
A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information in order to obtain a financial advantage.