1A: Information Security Roles

0.0(0)
studied byStudied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/6

Last updated 8:55 PM on 12/8/22
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

7 Terms

1
New cards
Non-repudiation
A subject cannot deny doing something, such as creating, modifying, or sending a resource.
2
New cards
Core cybersecurity tasks (the five functions)
Identify
Protect
Detect
Respond
Recover
3
New cards
Security Operations Center (SOC)
Location where security professionals monitor and protect critical information assets across other business functions. Usually employed by larger corporations.
4
New cards
Development and Operations (DevOps)
Highly orchestrated environment that encourages much more collaboration between developers and system administrators. IT personnel and developers can build, test, and release software faster and more reliably.
5
New cards
DevSecOps
Extends the DevOps boundary to security specialists/personnel, reflecting the shift left principle.
6
New cards
Shift Left
Principle that security needs to be a primary consideration at every stage of software development and deployment. Considerations need to be made during requirements and planning phases, not grafted on at the end.
7
New cards
Cyber Incident Response Team (CIRT)
A single point-of-contact for the notification of security incidents. May be handled by SOC or may be an independent business unit.