1/56
Vocabulary flashcards covering essential cybersecurity terms, concepts, tools, and skills extracted from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybersecurity
The practice of protecting the confidentiality, integrity, and availability of information and systems.
Cybersecurity Analyst
A professional who monitors networks for threats, develops security strategies, and works to prevent security incidents.
Compliance
Adherence to internal policies and external regulations to avoid legal penalties and security issues.
Security Framework
A structured set of guidelines used to mitigate risks and safeguard data and privacy.
Security Control
A specific safeguard or countermeasure implemented to reduce security risk within a framework.
Security Posture
An organization’s overall ability to defend its assets and respond effectively to threats.
Threat
Any event or circumstance that could harm assets such as data, systems, or networks.
Threat Actor
An individual or group responsible for carrying out a threat or malicious activity.
Internal Threat
Accidental or intentional risk originating from insiders like employees, vendors, or partners.
Network Security
The protection of network infrastructure, devices, and data from unauthorized access.
Cloud Security
Ensuring cloud resources are configured correctly and accessible only to authorized users.
Programming (in Cybersecurity)
Writing code to automate repetitive tasks, analyze web traffic, and alert on suspicious activity.
Programming Languages
Tools such as Python or PowerShell used to automate processes and analyze security-related data.
SIEM (Security Information and Event Management)
Technology that collects, correlates, and analyzes log data to monitor and alert on critical activities.
Intrusion Detection System (IDS)
Software or hardware that monitors system activity and alerts on potential intrusions.
Threat Landscape Knowledge
Up-to-date awareness of current attack methods, malware, and adversary tactics.
Incident Response
Structured procedures for investigating, containing, eradicating, and recovering from security incidents.
Communication (Skill)
The ability to convey technical information clearly to both technical and non-technical audiences.
Problem-Solving (Skill)
Identifying attack patterns and proposing effective security solutions.
Time Management (Skill)
Prioritizing tasks efficiently to minimize damage and risk during security operations.
Growth Mindset
An openness to continuous learning in a rapidly evolving industry.
Diverse Perspectives
Collaborating respectfully with different viewpoints to solve security issues effectively.
Personally Identifiable Information (PII)
Data that can identify an individual, such as name, SSN, or email address.
Sensitive PII (SPII)
PII that requires stricter protection due to heightened privacy or regulatory requirements.
Technical Skills
Job-specific knowledge of cybersecurity tools, procedures, and policies.
Transferable Skills
Broad abilities—such as communication and problem-solving—applicable across multiple professions.
Cybersecurity
The practice of protecting the confidentiality, integrity, and availability of information and systems.
Cybersecurity Analyst
A professional who monitors networks for threats, develops security strategies, and works to prevent security incidents.
Compliance
Adherence to internal policies and external regulations to avoid legal penalties and security issues.
Security Framework
A structured set of guidelines used to mitigate risks and safeguard data and privacy.
Security Control
A specific safeguard or countermeasure implemented to reduce security risk within a framework.
Security Posture
An organization\u2019s overall ability to defend its assets and respond effectively to threats.
Threat
Any event or circumstance that could harm assets such as data, systems, or networks.
Threat Actor
An individual or group responsible for carrying out a threat or malicious activity.
Internal Threat
Accidental or intentional risk originating from insiders like employees, vendors, or partners.
Network Security
The protection of network infrastructure, devices, and data from unauthorized access.
Cloud Security
Ensuring cloud resources are configured correctly and accessible only to authorized users.
Programming (in Cybersecurity)
Writing code to automate repetitive tasks, analyze web traffic, and alert on suspicious activity.
Programming Languages
Tools such as Python or PowerShell used to automate processes and analyze security-related data.
SIEM (Security Information and Event Management)
Technology that collects, correlates, and analyzes log data to monitor and alert on critical activities.
Intrusion Detection System (IDS)
Software or hardware that monitors system activity and alerts on potential intrusions.
Threat Landscape Knowledge
Up-to-date awareness of current attack methods, malware, and adversary tactics.
Incident Response
Structured procedures for investigating, containing, eradicating, and recovering from security incidents.
Communication (Skill)
The ability to convey technical information clearly to both technical and non-technical audiences.
Problem-Solving (Skill)
Identifying attack patterns and proposing effective security solutions.
Time Management (Skill)
Prioritizing tasks efficiently to minimize damage and risk during security operations.
Growth Mindset
An openness to continuous learning in a rapidly evolving industry.
Diverse Perspectives
Collaborating respectfully with different viewpoints to solve security issues effectively.
Personally Identifiable Information (PII)
Data that can identify an individual, such as name, SSN, or email address.
Sensitive PII (SPII)
PII that requires stricter protection due to heightened privacy or regulatory requirements.
Technical Skills
Job-specific knowledge of cybersecurity tools, procedures, and policies.
Transferable Skills
Broad abilities0such as communication and problem-solving0applicable across multiple professions.
Vulnerability
A weakness in a system or network that can be exploited by a threat.
Risk
The potential for loss, damage, or destruction of an asset due to a threat exploiting a vulnerability.
Malware
Malicious software, including viruses, worms, and ransomware, designed to disrupt or damage systems.
Phishing
A social engineering attack where attackers impersonate trusted entities to trick individuals into revealing sensitive information.
Encryption
The process of converting information or data into a code to prevent unauthorized access.