Foundations of Cyber Security

studied byStudied by 2 people
0.0(0)
Get a hint
Hint

CIA Triad

1 / 34

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

35 Terms

1

CIA Triad

A model guiding organizations in risk management regarding confidentiality, integrity, and availability.

New cards
2

Compliance

Adhering to internal standards and external regulations.

New cards
3

Security Governance

Practices that define and direct an organizationā€™s security efforts.

New cards
4

Security Ethics

Guidelines for making ethical decisions in security roles.

New cards
5

Security Frameworks

Guidelines for building plans to mitigate risks to data and privacy.

New cards
6

Confidentiality

Ensuring that only authorized users can access specific assets or data.

New cards
7

Integrity

The assurance that data is correct, authentic, and reliable.

New cards
8

Availability

Ensuring that data is accessible to authorized users.

New cards
9

Threat

Any event that can negatively impact assets.

New cards
10

Threat Actor

Individuals or groups posing security risks.

New cards
11

Internal Threat

Current or former employees or trusted partners posing a security risk.

New cards
12

External Threat

Risks posed by individuals or entities outside the organization.

New cards
13

Adversarial Artificial Intelligence

Techniques that manipulate AI and machine learning to conduct attacks efficiently.

New cards
14

Phishing

Digital communications designed to trick individuals into revealing sensitive data.

New cards
15

Spear Phishing

Targeted phishing attacks directed at specific individuals.

New cards
16

Social Engineering

Techniques exploiting human error to gain private information.

New cards
17

Vishing

Exploiting voice communication to obtain sensitive information.

New cards
18

USB Baiting

Leaving malware-infected USB drives for users to find and connect.

New cards
19

Watering Hole Attack

Compromising a website frequented by a specific user group.

New cards
20

Supply-Chain Attack

Targeting vulnerabilities in systems, applications, or software.

New cards
21

Physical Attack

Security incidents affecting both digital and physical environments.

New cards
22

Antivirus Software

Programs used to prevent, detect, and eliminate malware and viruses.

New cards
23

Malware

Software designed to harm devices or networks.

New cards
24

Intrusion Detection System (IDS)

An application that monitors system activity for potential intrusions.

New cards
25

Security Information and Event Management (SIEM)

Applications that collect and analyze log data for monitoring.

New cards
26

Network Security

Practices to secure an organization's network from unauthorized access.

New cards
27

Cloud Security

Ensuring that cloud-stored assets are configured correctly and accessible only to authorized users.

New cards
28

Personally Identifiable Information (PII)

Information that can be used to infer an individualā€™s identity.

New cards
29

Sensitive Personally Identifiable Information (SPII)

A specific type of PII with stricter handling guidelines.

New cards
30

Protected Health Information (PHI)

Information regarding an individualā€™s health or medical conditions.

New cards
31

Cybersecurity Analyst

Focuses on monitoring networks for breaches, developing security strategies, and researching IT security trends.

New cards
32

Security Architecture

A design composed of components to protect an organization from risks.

New cards
33

Security Posture

An organization's ability to manage its defense against threats.

New cards
34

Health Insurance Portability and Accountability Act (HIPAA)

U.S. federal law protecting patientsā€™ health information.

New cards
35

National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

A voluntary framework with standards to manage cybersecurity risk.

New cards

Explore top notes

note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
4.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 69 people
... ago
5.0(3)
note Note
studied byStudied by 18 people
... ago
4.5(2)

Explore top flashcards

flashcards Flashcard (80)
studied byStudied by 13 people
... ago
4.0(1)
flashcards Flashcard (73)
studied byStudied by 15 people
... ago
4.5(2)
flashcards Flashcard (65)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 242 people
... ago
5.0(5)
flashcards Flashcard (79)
studied byStudied by 12 people
... ago
5.0(1)
flashcards Flashcard (80)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 228 people
... ago
5.0(4)
robot