Cybersecurity Module 1 Terms

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Compliance

is the process of adhering to internal standards and external regulations and enables organizations to avoid fines and security breaches.

2
New cards

Security frameworks

are guidelines used for building plans to help mitigate risks and threats to data and privacy.

3
New cards

Security controls

are safeguards designed to reduce specific security risks. They are used with security frameworks to establish a strong security posture.

4
New cards

Security Posture

is an organization’s ability to manage its defense of critical assets and data and react to change. A strong security posture leads to lower risk for the organization.

5
New cards

A threat actor

A malicious attacker, is any person or group who presents a security risk. This risk can relate to computers, applications, networks, and data.

6
New cards

An internal threat

can be a current or former employee, an external vendor, or a trusted partner who poses a security risk. At times, an internal threat is accidental. For example, an employee who accidentally clicks on a malicious email link would be considered an accidental threat. Other times, the internal threat actor intentionally engages in risky activities, such as unauthorized data access.

7
New cards

Network security

is the practice of keeping an organization's network infrastructure secure from unauthorized access. This includes data, services, systems, and devices that are stored in an organization’s network.

8
New cards

Cloud security

is the process of ensuring that assets stored in the cloud are properly configured, or set up correctly, and access to those assets is limited to authorized users. The cloud is a network made up of a collection of servers or computers that store resources and data in remote physical locations known as data centers that can be accessed via the internet. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.

9
New cards

Programming

is a process that can be used to create a specific set of instructions for a computer to execute tasks. These tasks can include: