Foundations of Cybersecurity_W1

5.0(1)
studied byStudied by 17 people
5.0(1)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Cybersecurity (Security)

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

Ex. requiring complex passwords to access sites and services improves confidentiality by making it much more difficult for a threat actor to compromise them.

2
New cards

Threat actor

Any person or group who presents a security risk

3
New cards

External threats

An external threat is someone outside of the organization trying to gain access to private information, networks or devices.

4
New cards

Internal threats

Comes from current or former employees, external vendors, or trusted partners (often accidental.)

5
New cards

Responsibilities for security teams

  • mitigate or reduce the impact of threats

  • ensure an organization meets regulatory compliance, or laws and guidelines, that require the implementation of specific security standards

  • maintain and improve business productivity

6
New cards

Security analyst

Responsible for monitoring and protecting information and systems.

7
New cards

Security analyst responsibilities

  • protecting computer and network systems

  • prevent threats from happening in the first place (installing prevention software)

  • conducting periodic security audits

8
New cards

Security audit

A review of an organization’s security records, activities, and other related documents.

9
New cards

Compliance

The process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

10
New cards

Security frameworks

Guidelines used for building plans to help mitigate risks and threats to data and privacy.

11
New cards

Security controls

Safeguards designed to reduce specific security risks. Used with security frameworks to establish a strong security posture.

12
New cards

Network security

The practice of keeping an organization’s network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.

13
New cards

Cloud security

The process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users.

Specifically focuses on the protection of data, applications, and infrastructure in the cloud.

14
New cards

Programming

A process that can be used to create a specific set of instructions for a computer to execute tasks.

Tasks include:

  • automation of repetitive tasks (searching a list of malicious domains)

  • reviewing web traffic

  • alerting suspicious activity

15
New cards
16
New cards
17
New cards
18
New cards
19
New cards
20
New cards

Explore top flashcards

msk pathologies
Updated 73d ago
flashcards Flashcards (295)
Music9Q2
Updated 740d ago
flashcards Flashcards (21)
RESPIRATORY SYSTEM
Updated 1056d ago
flashcards Flashcards (102)
Foundations of Cybersecurity_W1
Updated 755d ago
flashcards Flashcards (20)
第九课
Updated 982d ago
flashcards Flashcards (55)
msk pathologies
Updated 73d ago
flashcards Flashcards (295)
Music9Q2
Updated 740d ago
flashcards Flashcards (21)
RESPIRATORY SYSTEM
Updated 1056d ago
flashcards Flashcards (102)
Foundations of Cybersecurity_W1
Updated 755d ago
flashcards Flashcards (20)
第九课
Updated 982d ago
flashcards Flashcards (55)