GCS 5-1: Assets-Intro

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/56

flashcard set

Earn XP

Description and Tags

Google Cybersecurity Course 5 (Assets, Threats, and Vulnerabilities) Module 1 (Introduction to asset security)

Last updated 6:18 PM on 5/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

57 Terms

1
New cards

communicate

“As a new cybersecurity analyst, it’s important to be able to _____, take feedback, and feel uncomfortable.”

2
New cards

knowing

“No one is born _____ everything.”

3
New cards

Risk

Anything that can impact the confidentiality, integrity, or availability of an asset.

4
New cards

Security risk planning

  • Assets

  • Threats

  • Vulnerabilities

5
New cards

Asset

An item perceived as having value to an organization.

6
New cards

Threat

Any circumstance or event that can negatively impact assets.

7
New cards

Vulnerability

A weakness that can be exploited by a threat.

8
New cards

No lock, unlocked lock, weak lock, old cracked wood.

Vulnerability examples for a front door

9
New cards

Likelihood x Impact

Formula for Risk

10
New cards

Risk helps

  • Prevent costly and disruptive events

  • Identify improvements that can be made to systems and processes

  • Determine which risks can be tolerated

  • Prioritize the critical assets that require attention

11
New cards

Threats, vulnerabilities

Risk factors

12
New cards

intentional, unintentional

Categories of threats

13
New cards

technical, human

Categories of vulnerabilities

14
New cards

problem solving, creative thinking

“_______ _______ ability and ________ ________ are important in cybersecurity.”

15
New cards

family, friends

“We can be there to protect our users, or ______ members, or _______.”

16
New cards

Asset management

The process of tracking assets and the risks that affect them.

17
New cards

Asset inventory

A catalog of assets that need to be protected.

18
New cards

Asset classification

The practice of labeling assets based on sensitivity and importance to an organization.

19
New cards

Public, internal-only, confidential, restricted

Levels of asset classification

20
New cards

Public

Assets that can be shared with anyone.

21
New cards

Internal-only

Assets that can be shared with anyone in the organization but should not be shared outside of it.

22
New cards

Confidential

Assets that should only be accessed by those working on a specific project.

23
New cards

Restricted

Assets that are typically highly sensitive and must be protected.

24
New cards

Data

Information that is translated, processed, or stored by a computer.

25
New cards

In use, in transit, at rest

States of dataD

26
New cards

Data in use

Data being accessed by one of more users.

27
New cards

Data in transit

Data traveling from one point to another.D

28
New cards

Data at rest

Data not currently being accessed.

29
New cards

Information security

Aka InfoSec

30
New cards

InfoSec

The practice of keeping data in all states away from unauthorized users.

31
New cards

Cloud computing

An on-demand, massively scalable service, hosted on shared infrastructure, accessible via the internet.

32
New cards

SaaS

Frontend applications that users access via a web browser like Gmail, Slack, and Zoom.

33
New cards

Software as a service

Aka SaaS

34
New cards

Platform as a service

Aka PaaS

35
New cards

PaaS

Refers to back-end application development tools that clients can access online like Google App Engine, Heroku, and VMware Cloud Foundry.

36
New cards

Infrastructure as a service

Aka IaaS

37
New cards

IaaS

Companies that give customers remote access to a range of back-end systems that are hosted by the cloud service provider like Google Cloud Platform, Microsoft Azure.

38
New cards

Cloud security challenges

  • Misconfiguration

  • Cloud-native breaches

  • Monitoring access might be difficult

  • Meeting regulatory standards

39
New cards

Burning Glass

A leading labor market analytics firm.

40
New cards

Damage, disclosure, loss of information

Types of risk categories

41
New cards

Policies, standards, procedures

Elements of a security plan

42
New cards

Policy

A set of rules that reduces risk and protects information.

43
New cards

Acceptable use policy

Aka AUP

44
New cards

AUP

These provisiions outline secure ways that an employee may access corporate systems.

45
New cards

Standards

References that inform how to set policies.

46
New cards

Procedures

Step-by-step instructions to perform a specific security task.

47
New cards

Compliance

The process of adhering to internal standards and external regulations.

48
New cards

Regulations

Rules set by a government or other authority to control the way something is done.

49
New cards

NIST Cybersecurity Framework

Aka NIST CSF.

50
New cards

NIST CSF

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.

51
New cards

Core, tiers, profiles

NIST CSF components

52
New cards

Identify, Protect, Detect, Respond, Recover

Five functions of the NIST CSF core

53
New cards

Tiers

These provide security teams with a way to measure performance across each of the five functions of the core. They range from Level-1 to Level-4.

54
New cards

Level-1

This tier is known as passive. It is an indication that a function is reaching bare minimum standards.

55
New cards

Level-4

This tier is known as adaptive. It is an indication that a function is being performed at an exemplary standard.

56
New cards

Profiles

These provide insight into the current state of a security plan. One way to think of profiles is like photos capturing capturing a moment in time. Without photos, you may not have noticed how this tree has changed. They are used to help organizations develop a baseline for their cybersecurity plans, or as a way of comparing their current cybersecurity posture to a specific industry standard.

57
New cards

Risk register

A central record of potential risks to an organization’s assets, information systems, and data. Commonly used when conducting a risk assessment.