Terms and definitions from Course 1, Module 1
Cybersecurity (or security)
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Cloud security
The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users
Internal threat
A current or former employee, external vendor, or trusted partner who poses a security risk
Network security
The practice of keeping an organization's network infrastructure secure from unauthorized access
Personally identifiable information (PII)
Any information used to infer an individual’s identity
Security posture
An organization’s ability to manage its defense of critical assets and data and react to change
Sensitive personally identifiable information (SPII)
A specific type of PII that falls under stricter handling guidelines
Technical skills
Skills that require knowledge of specific tools, procedures, and policies
Threat
Any circumstance or event that can negatively impact assets
Threat actor
Any person or group who presents a security risk
Transferable skills
Skills from other areas that can apply to different careers
Computer Virus
Malicious code is written to Interfere with computer operations and cause damage to data & software.
Malware
Software designed to harm devices or networks.
Brain Virus
The virus was created by Pakistani brothers Amjad and Basit Farooq Alvi to track and stop illegal copies of their program, while also gauging piracy. The virus could sometimes destroy data, but it was not designed to corrupt data or spread chaos
Morris Worm
The worm sought out computers running a particular version of the UNIX operating system and spread rapidly by exploiting security flaws known by Morris and other skilled programmers.
Social Engineering
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.