1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Cybersecurity
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
Cloud Security
The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users.
Internal Threat
A current or former employee, external vendor, or trusted partner who poses a security risk.
Network Security
The practice of keeping an organization's network infrastructure secure from unauthorized access.
Personally Identifiable Information (PII)
Any information used to infer an individual’s identity.
Sensitive Personally Identifiable Information (SPII)
A specific type of PII that falls under stricter handling guidelines.
Security Posture
An organization’s ability to manage its defense of critical assets and data and react to change.
Technical Skills
Skills that require knowledge of specific tools, procedures, and policies.
Threat
Any circumstance or event that can negatively impact assets.
Threat Actor
Any person or group who presents a security risk.
Transferable Skills
Skills from other areas that can apply to different careers.