NIST 800-181 Cybersecurity Workforce Framework Save

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards
NIST 800-181 categories
Securely Provision, Operate and Maintain, Protect and Defend
2
New cards
NIST 800-181
A workforce framework that categorizes cybersecurity roles into specialty areas.
3
New cards
Securely Provision tasks
System design, security architecture, and software development.
4
New cards
Operate and Maintain tasks
System administration, network monitoring, and patch management.
5
New cards
Protect and Defend tasks
Intrusion detection, incident response, and threat analysis.
6
New cards
CIA Triad
Confidentiality, Integrity, Availability.
7
New cards
Least Privilege
Users should have only the minimum access needed to perform their job.
8
New cards
Defense in Depth
A layered security approach using multiple defensive strategies.
9
New cards
Zero Trust Security
A security model that assumes no user or system is automatically trusted.
10
New cards
risk assessment
The process of identifying and analyzing potential threats and vulnerabilities.
11
New cards
phishing
A social engineering attack tricking users into revealing sensitive information.
12
New cards
DDoS attack
A Distributed Denial-of-Service attack that overwhelms a system with traffic.
13
New cards
malware
Malicious software designed to harm or exploit a system.
14
New cards
Man-in-the-Middle (MitM) attack
An attacker intercepts communication between two parties.
15
New cards
ransomware
Malware that encrypts data and demands payment for decryption.
16
New cards
brute force attack
Repeatedly trying passwords until the correct one is found.
17
New cards
SQL injection
An attack that exploits vulnerabilities in a database query.
18
New cards
zero-day vulnerability
A software flaw unknown to the vendor, leaving it unpatched.
19
New cards
trojan horse
Malware disguised as legitimate software.
20
New cards
spyware
Malware that secretly gathers user information.
21
New cards
firewall
A security device that monitors and controls network traffic.
22
New cards
IDS (Intrusion Detection System)
A system that detects unauthorized access or anomalies in a network.
23
New cards
IPS (Intrusion Prevention System)
A system that actively blocks detected threats.
24
New cards
network segmentation
Dividing a network into sections to enhance security.
25
New cards
VLAN (Virtual Local Area Network)
A logical subdivision of a network to separate traffic.
26
New cards
port scanning
A technique to identify open ports on a network.
27
New cards
honeypot
A decoy system designed to lure and detect attackers.
28
New cards
MAC filtering
Allowing or denying network access based on MAC addresses.
29
New cards
air-gapped network
A network that is physically isolated from unsecured networks.
30
New cards
access control list (ACL)
A set of rules that control network traffic.
31
New cards
encryption
The process of converting data into a secure format.
32
New cards
symmetric encryption
Encryption using the same key for both encryption and decryption.
33
New cards
asymmetric encryption
Encryption using a public and private key pair.
34
New cards
hashing
A one-way transformation of data into a fixed-length string.
35
New cards
digital signature
A cryptographic method to verify authenticity and integrity.
36
New cards
VPN (Virtual Private Network)
A secure tunnel for encrypted communication over the internet.
37
New cards
Multi-Factor Authentication (MFA)
A security method requiring multiple forms of verification.
38
New cards
Single Sign-On (SSO)
A system allowing users to log in once and access multiple applications.
39
New cards
Access Token
A credential used to authenticate a user session.
40
New cards
Wireshark
Network packet analysis.
41
New cards
Nmap
Network scanning and reconnaissance.
42
New cards
Metasploit
A penetration testing framework.
43
New cards
Splunk
Security event logging and analysis.
44
New cards
tracert command
Shows the path packets take to a destination.
45
New cards
netstat command
Displays active network connections.
46
New cards
ipconfig command
Displays network adapter information.
47
New cards
GDPR
General Data Protection Regulation for protecting personal data in the EU.
48
New cards
HIPAA
A U.S. law protecting medical information.
49
New cards
PCI DSS
A security standard for handling credit card data.
50
New cards
SOC 2 compliance
A security framework for cloud and IT service providers.
51
New cards
Incident Response Plan (IRP)
A documented plan outlining how to detect, respond to, and recover from security incidents.
52
New cards
Six phases of the incident response lifecycle
Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.
53
New cards
Digital Forensics
The practice of investigating cyber incidents by analyzing digital evidence.
54
New cards
Chain of Custody in Digital Forensics
The process of maintaining a documented history of evidence handling.
55
New cards
Forensic Image
A bit-for-bit copy of a storage device for investigation.
56
New cards
Memory Forensics
The analysis of volatile memory (RAM) to detect malware or system intrusions.
57
New cards
Forensic Imaging Tool
FTK Imager or Autopsy.
58
New cards
Sandbox in Cybersecurity
A controlled environment for safely testing suspicious files or applications.
59
New cards
Live Analysis in Forensic Investigations
Examining an active system to gather evidence before shutdown.
60
New cards
Purpose of Log Analysis in Incident Response
To identify suspicious activity and security breaches.
61
New cards
Security Baseline
A set of minimum security configurations for a system.
62
New cards
Principle of 'Least Functionality'
Removing unnecessary services and applications to reduce attack surfaces.
63
New cards
Windows Group Policy
A tool used to enforce security settings on Windows machines.
64
New cards
Standard User vs Administrator Account
A standard user has limited permissions, while an administrator has full control over system settings.
65
New cards
Rootkit
Malware designed to gain privileged access and hide its presence on a system.
66
New cards
User Account Control (UAC) in Windows
A security feature that limits administrative privileges unless explicitly granted.
67
New cards
SELinux
A security module in Linux for enforcing access control policies.
68
New cards
Immutable Operating System
An OS that prevents changes to its core components to enhance security.
69
New cards
Patching
The process of applying updates to fix security vulnerabilities.
70
New cards
Endpoint Detection and Response (EDR) Solution
A tool for monitoring and responding to threats on individual devices.
71
New cards
WPA3
The latest Wi-Fi security standard that improves encryption and security.
72
New cards
MAC address spoofing
Changing a device's MAC address to impersonate another device.
73
New cards
rogue access point
An unauthorized wireless access point that poses a security risk.
74
New cards
public cloud
A public cloud is shared across multiple users, while a private cloud is dedicated to a single organization.
75
New cards
cloud encryption
Encrypting data stored in the cloud to prevent unauthorized access.
76
New cards
cloud security best practices
Use MFA, encrypt data, implement access controls, and monitor activity logs.
77
New cards
shared responsibility model in cloud security
A security framework where cloud providers and users both have security responsibilities.
78
New cards
Identity as a Service (IDaaS)
A cloud-based authentication and identity management service.
79
New cards
Infrastructure as Code (IaC)
Managing cloud infrastructure through code instead of manual configuration.
80
New cards
CASB (Cloud Access Security Broker)
A security tool that monitors and controls cloud-based applications.
81
New cards
tailgating in cybersecurity
When an unauthorized person follows an authorized person into a secure area.
82
New cards
pretexting
A social engineering tactic where attackers create a fake scenario to obtain information.
83
New cards
baiting in cybersecurity
Luring victims with fake offers or malicious USB devices.
84
New cards
shoulder surfing
Observing someone's screen or keyboard to steal credentials.
85
New cards
vishing
Voice phishing - using phone calls to trick victims into revealing sensitive information.
86
New cards
smishing
SMS phishing - using text messages to trick users into clicking malicious links.
87
New cards
best way to prevent social engineering attacks
Security awareness training and verifying identities before sharing sensitive information.
88
New cards
insider threat
A security risk posed by employees or contractors with access to sensitive data.
89
New cards
two-person integrity (TPI)
A security measure that requires two people to approve a critical action.
90
New cards
role of security awareness training
Educating employees on cybersecurity best practices to prevent attacks.
91
New cards
Threat Hunting
Proactively searching for cyber threats within an organization's network.
92
New cards
Cyber Threat Intelligence (CTI)
The collection and analysis of threat data to improve security defenses.
93
New cards
MITRE ATT&CK framework
A knowledge base of adversary tactics and techniques used in cyberattacks.
94
New cards
Security Operations Center (SOC)
A centralized unit responsible for monitoring and responding to security incidents.
95
New cards
Red Team vs. Blue Team
The Red Team simulates attacks, while the Blue Team defends against them.
96
New cards
Purple Teaming
A collaboration between Red and Blue Teams to improve security defenses.
97
New cards
security orchestration, automation, and response (SOAR)
To automate and streamline security processes.
98
New cards
advanced persistent threat (APT)
A long-term, targeted cyberattack by a sophisticated adversary.
99
New cards
cyber resilience
The ability to maintain security and recover quickly from cyber incidents.
100
New cards
best way to stay updated on cybersecurity threats
Follow security blogs, attend conferences, and participate in cybersecurity competitions.