What is Cybersecurity Flashcards
Nichols, L. (2024) Cybersecurity Architect’s handbook an end-to-end guide to implementing and maintaining robust security architecture. Birmingham: Packt Publishing, Limited. (69 cards)
What is the job title of the pinnacle of a cybersecurity technical career?
Cybersecurity Architect (CSA)
What is the role of a CSA?
To help shape, design, and plan the technical aspects of an organization’s approach to security at all levels.
What is Access Control?
involves the procedure of permitting solely authorized individuals, programs, or other computer systems to observe, alter, or gain control over a computer system’s resources. IT acts as a mechanism to restrict the utilization of certain resources to only those users who have been granted authorization.
What is Secure Software Development?
encompasses a series of procedures and tasks associated with the strategic planning, coding, and administration of software and systems. Furthermore, it encompasses the implementation of protective measures within those systems to guarantee the confidentiality, integrity, and availability of both the software and the data in processes.
What is BCP/DR?
ITs Business Continuity Planning / Disaster Recover. which encompasses the essential measures, procedures ,and strategies required to uphold uninterrupted business operations in the face of significant disruptions. This entails recognizing, choosing, executing, testing, and maintaining processes and specific actions aimed at safeguarding vital business infrastructure and operations from system and network interruptions. The ultimate goal is to promptly restore essential services and business activities to their normal functioning state.
What is cryptography?
The science of using deception and mathematics to hide data from unwanted access. It addresses the principles, means, and methods to convert plaintext into ciphertext and back again to ensure the confidentiality, integrity, and authenticity or non-repudiation of data.
What is information security governance / risk management?
The multifaceted strategies organizations employ to safeguard critical information assets and systems. This discipline seeks to establish holistic criteria for the protection by integrating frameworks, policies, organized culture, and standards.
What is Computer crime legislation?
Laws prohibiting unauthorized access, hacking, malware distribution, and other cyber offenses
What are Associated regulations?
Mandates around data privacy, breach disclosure, sector-specific requirements, and cybersecurity standards
What are investigative measures?
Techniques for detecting security incidents through monitoring, log analysis, and forensics
What are Evidence gathering/management methodologies?
Procedures for securely collecting, analyzing, documenting, and preserving evidence for investigations.
What are Reporting protocols?
Guidelines for reporting incidents to authorities and impacted parties.
What is foundational for security?
Adhering to legal and regulatory obligations
What is asset protection?
Ensuring hardware, applications, services, and data remain confidential and integral through access controls, encryption, and resilience measures
What is monitoring and detection?
Employing tools such as SIEMs and IDSs to continuously monitor systems, networks, and user activity to rapidly detect potential incidents
What is a Incident REsponse?
Investigating suspected or confirmed events, containing impacts, eradicating threats, recovering systems, and improving future response capabilities
What is ongoing maintenance?
Keeping security tools and services such as firewalls, antivirus, and log management operating reliably through patches, upgrades, and redundancy
What is process integration?
Incorporating security processes into IT operations and business workflows to embed good security hygiene.
What is physical and environmental security?
Physical and environmental security involves safeguarding facilities housing critical information systems against unauthorized access and environmental hazards.
What is a security survey?
Regularly evaluating facilities’ physical access controls, surveillance systems, and vulnerability to threats such as fires or floods
What is Risk vulnerability assessment?
Identifying physical infrastructure and procedural weaknesses that may enable data breaches or system damage
What is site planning and design?
Incorporating security into facility layouts through measures such as access control zones, cameras, alarms, and secure equipment rooms.
What are Access Control Systems?
Managing physical access to facilities and critical system components via methods such as ID badges, biometric validation, and multifactor authentication
What are Environmental controls?
Maintaining ideal temperature, humidity, electrical supply, fire suppression, and other environmental conditions to protect systems