Cybersecurity Unit 8 Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

risk assesment

  • figuring out the possible attacks

  • how bad the attacks are

  • how likely it is

2
New cards

threat

  • anything that might cause harm to systems or data

3
New cards

vulnerability

a weakness that could cause a threat to harm systems

4
New cards

impact

  • how much damage occurs after threat uses the vulnerability

5
New cards

qualititative

  • you asses based on the category high, low

6
New cards

quantitative

  • you asses based on numbers like costs, numbers, and percetnages

7
New cards

hybrid risk assessment

  • you asses using quantititative and qualititative

8
New cards

risk mitigation

  • reducing how bad the risk is

9
New cards

risk acceptance

  • choosing to live the risk bc its too small or expensive

10
New cards

risk transference

  • passing the risk to someone else

11
New cards

risk avoidance

  • completely getting rid of the risk

12
New cards

risk register

  • A list or table of all known risks, their impacts, and what’s being done about them.

13
New cards

compensating control

  • a backup method used when the main security control isn’t possible

14
New cards

incident response

  • the actions taken when a threat occurs

15
New cards

incident response plan

  • a step by step guide of the actions taken when a threat occurs

16
New cards

what are the 5 incident response steps?

  • Preparation

  • Identification

  • Containment

  • Eradication

  • Recovery

prom is continously evaporating sanity and reviving drama

17
New cards

preparation

  • gretting ready before the threat occurs w tools etc

18
New cards

identification

  • realizaing an event is occuring

19
New cards

containment

  • stopping the problem from spreading

20
New cards

eradication

  • completely removing the problem

21
New cards

recovery

  • bringing everything back to normal

22
New cards

post-incident review

  • going over what happened to improve overtime

23
New cards

forensics

  • studying what happened to gather facts

24
New cards

chain of custody

  • keep track of who handled evidence so it can be trusted in court

25
New cards

indicators of compromise

  • clues that an attack has happened

26
New cards

Security Information and Event Management (SIEM)

  • security software that gives organizations a bird's-eye-view of activity across their entire network so they can respond to threats faster—before business is disrupted

27
New cards

malware incident

  • when a system gets infected w malicious software

28
New cards

network intrusion

  • someone sneaking into a network w/o permission

29
New cards

business continuity plan

  • a plan to keep a business running during a crisis

30
New cards

disaster recovery plan

  • a plan to recover tech and data after a disaster

31
New cards

recovery time objective

  • how fast you need systems to be back online

32
New cards

failover

  • automatically switching to a backup if main systems fail

33
New cards

tabletop excercise

  • a group talks through a fake incident plan to test the plan

34
New cards

red team

  • offensice team that acts like hackers to test defenses

35
New cards

blue team

  • defensive team that responds to attacks and protects the sytem

36
New cards

purple team

  • combo of red and blue to work improve security

37
New cards

penetration testing

  • ethical finding holes in a system before real hackers do

38
New cards

Recovery Point Objective (RPO)

  • how much data you can afford to lose time-wise