1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
IT
includes computers and everything that can be done with them.
IT Security
is focused on protecting these computers, networks, and other digital systems against cyberattacks and other threats.
confidentiality
Protecting the privacy of data
Integrity
Ensuring that data has not been modified
availability
Providing continual access to data and systems
IT security
deals with all aspects of protecting IT assets against cyber threats.
identity security
includes methods and processes to identify, verify and authorize machines, devices, users, groups, applications, and functions
network security
involves securing on- prem networks, wide area networks (WAN), and the Internet
cloud security
As organizations increasingly adopt cloud technologies, they need cloud-specific security solutions
endpoint security
As employees increasingly work from home, endpoint security is more important than ever.
application and API security
Applications and application programming interfaces (APIs) are a major part of an organization’s attack surface and should be secured via code review, analysis and runtime analytics.
management
eploying an array of security solutions means that organizations need to manage them as well
Visibility And Incident Response
The goal of IT security is to protect the organization against cyber threats.
Vulnerability Exploitation
IT assets commonly run software that contains potentially exploitable vulnerabilities.
account takeover
Cybercriminals can steal account credentials via phishing and other social engineering attacks
financially motivated attacks
Cybercrime is a business with many opportunities to make money
Advanced persistent threats or APTs
are sophisticated threat actors financed by nation-states or organized crime.
poor security practices
Lax security configurations and access controls are a common problem in both on- prem and cloud-based environments.