Cyber Security Key Words: Module 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

CIA

Confidence, Integrity and Availability

2
New cards

Cloud

a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centres that can be accessed via the internet.

3
New cards

Cloud security

The process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorised users.

4
New cards

Compliance

The process of adhering to internal standards and external regulations and enables organisations to avoid fines and security breaches.

5
New cards

Cybersecurity (or security)

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorised access or criminal exploitation

6
New cards

External threats

someone outside of the organisation trying to gain access to private information, networks or devices

7
New cards

Incident response

Established policies and procedures for responding to incidents. Could include conducting an investigation to identify the root issue and remediation.

8
New cards

Identity Theft

The act of stealing personal information to commit fraud while impersonating a victim. The primary objective is financial gain.

9
New cards

Internal Threats

Current or former employees, external vendors, or trusted partners.

10
New cards

Intrusion Detection Systems (IDSs)

Used to monitor system activity and alert at possible intrusions, helping to keep data and assets safe.

11
New cards

Network Security

The practice of keeping an organisation’s network infrastructure secure from unauthorised access. This includes data, services and devices that are stored in an organisation’s network.

12
New cards

NIST

National Institute of Standards and Technology

13
New cards

PII

Personally Identifying Information

14
New cards

Personally Identifying Information (PII)

(key asset) Any information used to infer an individual’s identity. This information includes full name, DOB, address, phone number or email address, internet protocol (IP)

15
New cards

Programming

a process that can be used to create a specific set of instructions for a computer to execute tasks.

16
New cards

Programming tasks

Automation of repetitive tasks, Reviewing web traffic, Alerting suspicious activity

17
New cards

Security Controls

Safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture

18
New cards

Security Information and Event Management (SIEM)

Tools that collect and analyse log data or record events e.g. suspicious login behaviour.

19
New cards

Security Frameworks

Guidelines used for building plans to help mitigate risks and threats to data and privacy

20
New cards

Security Posture

An organisation’s ability to manage its defence of critical assets and data and react to change. A strong posture leads to a lower risk for the organisation.

21
New cards

SPII

Sensitive Personally Identifiable Information

22
New cards

Sensitive Personally Identifiable Information (SPII)

(key asset) This information includes Social Security No.s, Medical and Financial information and biometric data such as facial recognition. This is a specific type of PII that falls under stricter handling guidelines.

23
New cards

Technical skills

Skills that require knowledge of specific tools, procedures, and policies

24
New cards

Threat

Any circumstance or event that can negatively impact assets

25
New cards

Threat Actor

Any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.

26
New cards

Threat Landscape Knowledge

Awareness of current trends relating to threat actors, malware or threat methodologies. This awareness and knowledge helps to recognise new threats e.g. ransomware variants.

27
New cards

Transferable skills: Skills from other areas that can apply to different careers