1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
cybersecurity
the practice of protecting systems, networks, and data from cyber threats. It involves technologies, processes, and policies designed to prevent unauthorized access, attacks, and damage
large language models LLM
generative AI, a complex decision tree based on patterns in data and traine predictions
prompt engineering
techniques used to fine-tune the initial instructions given to AI and deliberately affect the resulting output
risk management
to what extent is it worth spending resources in cybersecurity in exchange for spending less resource if a cyber incident occurs
risk =
vulnerability + threat
vulnerability
a weakness that can be exploited
threats
a person, event, etc that can negatively impact the organization
risk
the likelihood and severity that an incident could occur from the threat exploiting the vulnerabilities
risk severity
the potential for damage done by a vulnerability exploited by a threat
methods of risk management
accept it, mitigate or control it, outsource or transfer it, and avoid it