Google Cybersecurity Certificate Flashcards

1
Q

Compliance

A

Compliance is thhe process of adhering to internal standards and external regulations enabling organizations to avoid fines, audits, and security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security frameworks

A

Security frameworks are guidelines used for building plans to help mitigate risks and threats to data and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Controls

A

Security controls are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security posture

A

Security posture is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Thread Actor

A

A threat actor, or malicious attacker, is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal Threat

A

An internal threat can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal actor intentionally engages in risky activities, such as unauthorized data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network security

A

Network security is the practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud security

A

Cloud security is the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known ad data centers that can be accessed via the Internet. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Programming

A

Programming is the process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include:
- Automation of repetitive tasks. (e.g. searching a list of malicious domains)
- Reviewing web traffic
- Alerting suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cybersecurity

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PIIthat falls under stricter handling guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Technical Skills

A

Skills that require knowledge of specific tools, procedures, and policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat

A

Any circumstance or event that can negatively impact assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transferable Skills

A

Skills from other areas that can apply to different careers.

17
Q

Malware

A

A software designed to harm devices or networks

18
Q

Virus

A

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data.

Example of Malware

19
Q

Worm

A

Malware that self-replicates, spreading across the network and infecting computers.

Example of Malware

20
Q

Ransomware

A

A malicious attack during which threat actors encrypt an organization’s data and demand payment to restore access.

Example of Malware

21
Q

Spyware

A

Malicious software installed on a user’s computer without their permission is used to spy on and steal user data.

Example of Malware

22
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

23
Q

Spear phishing

A

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source.

Example of Phishing

24
Q

Whaling

A

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data.

Example of: Phishing