Foundations of cybersecurity ultimate

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

flashcard set

Earn XP

Description and Tags

compiled modules

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Cybersecurity

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access

2
New cards

Threat actor

any person or group who presents a security risk

3
New cards

Benefits of security

protects from internal and external threats

maintains and improves business productivity

reduces expenses

maintains brand trust

reduces expenses

4
New cards

external threat

someone outside of the organization who is trying to gain access to private information

5
New cards

internal threat

a risk originating from within the organization, such as employees or contractors, that compromises data security. Can be accidental or intentional

6
New cards

Common security based roles

security analyst or specialist

security operations center analyst (SOC)

Information security analyst

7
New cards

job responsibilities of entry level security analyst

monitoring and protection information and systems

installing prevention software

conducting security audits

reviewing organizations security record and other documents

8
New cards

security professional duties

operations: responding to detections and doing investigations

projects: working with other teams to build or improve detections

9
New cards

compliance

adhering to laws, regulations, and standards related to information security and privacy

10
New cards

security frameworks

structured guidelines for managing security risks and controls.

11
New cards

security posture

a measure of an organizations ability to manage its defense of critical assets and data and react to change

12
New cards

security controls

the safeguards or countermeasures implemented to protect assets and reduce security risks. Used with security frameworks to build a strong security posture

13
New cards

network security

the practice of keeping an organizations network infrastructure secure from unauthorized access

14
New cards

Cloud security

The process of ensuring assets stored in the cloud are properly configured and access to those assets is limited to authorized users

15
New cards

The cloud

a network made up of a collection of servers or computers that store resources and data in remote physical locations that can be accessed with the internet

16
New cards

programming

a process that can be used to create a specific set of instructions for a computer to execute tasks

17
New cards

Confidentiality

ensures sensitive information is accessed only by authorized individuals

18
New cards

integrity

guarantees data remains accurate and unalted by unauthorized users

19
New cards

availability

ensures information and resources are accessible to authorized users when needed

20
New cards

CIA triad

a model that defines the three core principles of cybersecurity: confidentiality, integrity, and availability.

21
New cards

Risk management

The process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events

22
New cards

Adversarial artificial intelligence (AI)

A technique that manipulates AI and machine-learning technology to conduct attacks more efficiently.

23
New cards

Business Email Compromise (BEC)

A phishing attack in which a threat actor impersonates a trusted source to gain financial advantage.

24
New cards

CISSP

Certified Information Systems Security Professional— a globally recognized information-security certification awarded by (ISC)².

25
New cards

Computer virus

Malicious code written to interfere with computer operations and damage data or software.

26
New cards

Cryptographic attack

An attack aimed at compromising secure communications between a sender and intended recipient.

27
New cards

Hacker

A person who uses computers to gain unauthorized access to systems, networks, or data.

28
New cards

Malware

Software designed to harm devices or networks.

29
New cards

Password attack

An attempt to gain access to password secured devices, systems, networks, or data.

30
New cards

Phishing

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

31
New cards

Physical attack

A security incident that impacts both digital assets and the physical environment where it occurs.

32
New cards

Physical social engineering

An attack where a threat actor impersonates an employee, vendor, or customer to gain unauthorized physical access.

33
New cards

Social engineering

A manipulation technique that exploits human error to obtain private information, access, or valuables.

34
New cards

Social media phishing

An attack in which a threat actor gathers detailed information about a target from social media before striking.

35
New cards

Spear phishing

A malicious email attack targeting a specific user or group, appearing to come from a trusted source.

36
New cards

Supply-chain attack

An attack that targets systems, applications, hardware, or software in the supply chain to introduce malware.

37
New cards

USB baiting

An attack where a threat actor leaves a malware-infected USB drive for someone to plug in, compromising the network.

38
New cards

Vishing

Exploiting voice communication channels to obtain sensitive information or impersonate a trusted source.

39
New cards

Watering hole attack

Compromising a website frequently visited by a specific group of users to infect their systems.