Terms Flashcards

1
Q

Compliance

A

Is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Frameworks

A

Are guidelines used for building plans to help mitigate risks and threats to data and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Controls

A

Are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Posture

A

Is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Actor

A

Is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data. Also known as a malicious attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal Threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Security

A

Is the practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Programming

A

Is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include:

-Automation of repetitive tasks (e.g., searching a list of malicious domains)
-Reviewing web traffic
-Alerting suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transferable skills (There are 5 of them)

A

Skills from other areas that can apply to different careers

-Communication
-Problem-solving
-Time management
-Growth mindset
-Diverse perspectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Communication

A

As a cybersecurity analyst, you will need to communicate and collaborate with others. Understanding others’ questions or concerns and communicating information clearly to individuals with technical and non-technical knowledge will help you mitigate security issues quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Problem-solving

A

One of your main tasks as a cybersecurity analyst will be to proactively identify and solve problems. You can do this by recognizing attack patterns, then determining the most efficient solution to minimize risk. Don’t be afraid to take risks, and try new things. Also, understand that it’s rare to find a perfect solution to a problem. You’ll likely need to compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Time management

A

Having a heightened sense of urgency and prioritizing tasks appropriately is essential in the cybersecurity field. So, effective time management will help you minimize potential damage and risk to critical assets and data. Additionally, it will be important to prioritize tasks and stay focused on the most urgent issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Growth mindset

A

This is an evolving industry, so an important transferable skill is a willingness to learn. Technology moves fast, and that’s a great thing! It doesn’t mean you will need to learn it all, but it does mean that you’ll need to continue to learn throughout your career. Fortunately, you will be able to apply much of what you learn in this program to your ongoing professional development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Diverse perspectives

A

The only way to go far is together. By having respect for each other and encouraging diverse perspectives and mutual respect, you’ll undoubtedly find multiple and better solutions to security problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Technical skills (There are 5 of them)

A

Skills that require knowledge of specific tools, procedures, and policies

-Programming languages
-Security information and event management (SIEM) tools
-Intrusion detection systems (IDSs)
-Threat landscape knowledge
-Incident response

17
Q

Programming languages

A

By understanding how to use programming languages, cybersecurity analysts can automate tasks that would otherwise be very time consuming. Examples of tasks that programming can be used for include searching data to identify potential threats or organizing and analyzing information to identify patterns related to security issues.

18
Q

Security information and event management (SIEM) tools

A

SIEM tools collect and analyze log data, or records of events such as unusual login behavior, and support analysts’ ability to monitor critical activities in an organization. This helps cybersecurity professionals identify and analyze potential security threats, risks, and vulnerabilities more efficiently.

19
Q

Intrusion detection systems (IDSs)

A

Cybersecurity analysts use IDSs to monitor system activity and alerts for possible intrusions. It’s important to become familiar with IDSs because they’re a key tool that every organization uses to protect assets and data. For example, you might use an IDS to monitor networks for signs of malicious activity, like unauthorized access to a network.

20
Q

Threat landscape knowledge

A

Being aware of current trends related to threat actors, malware, or threat methodologies is vital. This knowledge allows security teams to build stronger defenses against threat actor tactics and techniques. By staying up to date on attack trends and patterns, security professionals are better able to recognize when new types of threats emerge such as a new ransomware variant.

21
Q

Incident response

A

Cybersecurity analysts need to be able to follow established policies and procedures to respond to incidents appropriately. For example, a security analyst might receive an alert about a possible malware attack, then follow the organization’s outlined procedures to start the incident response process. This could involve conducting an investigation to identify the root issue and establishing ways to remediate it.

22
Q

Cybersecurity (or security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

23
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity

24
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls under stricter handling guidelines

25
Q

Threat

A

Any circumstance or event that can negatively impact assets