1/119
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybersecurity Threat
Event with potential for asset loss and undesirable consequences
Types of Asset Loss
Includes intentional, unintentional, misuse, abuse, error events
Cybersecurity Vulnerabilities
Weaknesses in system security that can be compromised
Cybersecurity Exploits
Means for hackers to execute malicious activities on a system
Types of Cybersecurity Breaches
Unauthorized access to an organization's systems, data, and information
Social Engineering
Manipulation of people to divulge confidential information
DDOS Attack
Cyberattack to make a computer or online service unavailable
Cybersecurity Mitigation
Policies and procedures to prevent security incidents
Threat Prevention
Policies to protect systems and data from threats
Threat Identification
Tools designed to identify specific security threats
Threat Cure
Strategies used to lessen the impact of active security threats
Social Engineering Attacks
Designed to get individuals to divulge sensitive information
Confidentiality Goals
Protecting systems, data, and information from theft or attack
Integrity Goals
Maintaining data, information, and system integrity
External Threats to Cybersecurity
Risks external to the organization, including malware and phishing attacks
Internal Threats to Cybersecurity
Threats from inside the organization, including accidents and intentional attacks
Spyware
Software collecting information about Internet habits and behaviors
Adware
Software collecting the user's web browsing history
Cybersecurity Goals
Protecting systems, data, and information from theft or attack
Integrity Measures
Maintained through user-access controls, file permissions, version controls
Cybersecurity Breaches
Early-stage intrusions leading to system damage, data loss, and network downtime
Common Social Engineering Attacks
Designed to get individuals to divulge sensitive information
Web Crawlers
Bots used to gather information from websites
Malware Bots
Bots that infect hosts with self-propagating malware
Ransomware
Malware that encrypts data and demands ransom
Rootkit
Malware that hides in OS to control a computer
Keyloggers
Spyware recording keystrokes on devices
Trojan Horse
Program pretending to be legitimate but carries out unwanted activities
MitM Attack
Wrongdoer intercepts communication between user and application
Risk Analysis
Balances costs and benefits of cybersecurity countermeasures
Plan-Protect-Respond Cycle
Methodology for responding to security incidents
Security Posture Assessment
Evaluating existing security measures in place
Awareness Training
Educating employees to identify threats and follow protection policies
Identity Management
Control measures for physical and remote access to IT systems
Cybersecurity Response Planning
Preparing and executing activities during and after a security incident
Communication Management
Ensuring proper information dissemination during and after a cybersecurity event
Mitigation Activities
Efforts to minimize the impact and spread of a cybersecurity event
Lessons Learned Analysis
Reviewing incidents to prevent and respond better to future attacks
Customer Relationship Management Systems
Tools to assist businesses in managing customer relationships
Customer Acquisition
Processes to obtain new customers through various marketing strategies
Lead Generation Funnel
Process starting with customer interest leading to purchase
Marketing Qualified Leads (MQLs)
Prospective customers showing interest in a brand or product
Sales Qualified Leads (SQLs)
Leads ready to make a purchase after being qualified
Market Segmentation
Dividing customers into groups based on traits and interests
Target Market
Group of customers an organization aims to sell products/services to
Prospecting
Searching for potential customers and converting them to customers
Qualifying Potential Customers
Determining if an individual or business is worth pursuing as a customer
Customer Surveys
Feedback collection method to understand customer needs and preferences
Customer Interaction
All communication between customers and an organization
CRM Strategy
Plan including monitoring interactions, individual customer focus, automation, and customized communication
Monitor Customer Interactions
Using CRM to identify engaging communication methods
Customers as Individuals
Ensuring each customer has an individual contact record
Automation
CRM generates automatic responses, task scheduling, and communications
Customized Communication
CRM ensures messages are tailored to the customer
CRM Systems
Provide services to sales, marketing, and business development
CRM Software
Stores customer information for better targeting, tracking, and management
Identity Data
Demographic info like name, address, gender, and contact details
Quantitative Data
Includes transaction history, online activity, and customer service interactions
Qualitative Data
Reflects customer feelings, attitudes, opinions, and motivations
Descriptive Data
Additional demographic info like family status, lifestyle, and education
CRM Analytics
Provides insights into customer behavior for informed decisions
OLAP
Online analytical processing technology for data analysis and forecasting
Customer Segmentation
Grouping customers for behavior analysis
Customer Value and Profitability
Identifying high-revenue customers
Personalization
Customized marketing based on individual behavior
Predictive Modeling
Using past data to predict future outcomes
Share of Customer
Focuses on maximizing business from existing customers
Customer Equity
Value of future revenue minus acquisition and retention costs
Customer Profitability
Profit from selling to customers over a period
Customer Lifetime Value
Total amount a customer will spend over their lifetime
Data Breaches
Security risks from misconfigured databases exposing customer info
Ethical Considerations
Concerns about selling customer data to third parties
CRM Market Analytics
Utilized to guide new product development
Viability
Testing the feasibility of products or services
User Experience
Capturing data on customer product usage and buying behavior
Product Development
Insights from CRM analytics that foster innovation
Data Analytics
Investigating raw data to uncover trends and correlations.
Descriptive Analytics
Reveals historical trends in data sets, answering 'What happened?'
Predictive Analytics
Focuses on predicting future events and outcomes.
Prescriptive Analytics
Focuses on recommending actions for future outcomes.
Return on Investment (ROI)
Example of Descriptive Analytics, measures profitability.
Probability Analysis
Techniques used in Predictive Analytics to forecast outcomes.
Data Fabric
Set of data services spanning on-premise and Cloud environments.
Data Ecosystems
IT architecture, software, and technologies for data collection.
Key Performance Indicators (KPIs)
Metrics used to evaluate success or failure in business.
Data Visualization
Representing data graphically for easier understanding.
Structured Query Language (SQL)
Used to query databases and extract specific information.
Information Dashboards
Visual displays of consolidated data for key insights.
Spreadsheets
Software for data collection, organization, and manipulation.
Databases
Store, organize, and manipulate data, queried using SQL.
Data Visualization Tools
Create charts, tables, and graphs for data representation.
90% of Information to Brain
Visual data transmission dominance in human brain processing.
Pie Chart
Visual representation of data in a circular graph.
Bar Graph
Visual representation of data in rectangular bars.
Line Graph
Visual representation of data with points connected by lines.
Scatterplot
Visual representation of data points on a Cartesian plane.
Traditional File Management Systems
Pre-computer manual systems for data storage and processing
Data Redundancy
Duplication of data leading to inefficiency and higher costs
Data Inconsistency
Mismatch or errors in data across multiple records
DBMS
Computer program for creating, processing, and managing databases