NIST 800-181 Cybersecurity Workforce Framework Save

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

NIST 800-181 categories

Securely Provision, Operate and Maintain, Protect and Defend

2
New cards

NIST 800-181

A workforce framework that categorizes cybersecurity roles into specialty areas.

3
New cards

Securely Provision tasks

System design, security architecture, and software development.

4
New cards

Operate and Maintain tasks

System administration, network monitoring, and patch management.

5
New cards

Protect and Defend tasks

Intrusion detection, incident response, and threat analysis.

6
New cards

CIA Triad

Confidentiality, Integrity, Availability.

7
New cards

Least Privilege

Users should have only the minimum access needed to perform their job.

8
New cards

Defense in Depth

A layered security approach using multiple defensive strategies.

9
New cards

Zero Trust Security

A security model that assumes no user or system is automatically trusted.

10
New cards

risk assessment

The process of identifying and analyzing potential threats and vulnerabilities.

11
New cards

phishing

A social engineering attack tricking users into revealing sensitive information.

12
New cards

DDoS attack

A Distributed Denial-of-Service attack that overwhelms a system with traffic.

13
New cards

malware

Malicious software designed to harm or exploit a system.

14
New cards

Man-in-the-Middle (MitM) attack

An attacker intercepts communication between two parties.

15
New cards

ransomware

Malware that encrypts data and demands payment for decryption.

16
New cards

brute force attack

Repeatedly trying passwords until the correct one is found.

17
New cards

SQL injection

An attack that exploits vulnerabilities in a database query.

18
New cards

zero-day vulnerability

A software flaw unknown to the vendor, leaving it unpatched.

19
New cards

trojan horse

Malware disguised as legitimate software.

20
New cards

spyware

Malware that secretly gathers user information.

21
New cards

firewall

A security device that monitors and controls network traffic.

22
New cards

IDS (Intrusion Detection System)

A system that detects unauthorized access or anomalies in a network.

23
New cards

IPS (Intrusion Prevention System)

A system that actively blocks detected threats.

24
New cards

network segmentation

Dividing a network into sections to enhance security.

25
New cards

VLAN (Virtual Local Area Network)

A logical subdivision of a network to separate traffic.

26
New cards

port scanning

A technique to identify open ports on a network.

27
New cards

honeypot

A decoy system designed to lure and detect attackers.

28
New cards

MAC filtering

Allowing or denying network access based on MAC addresses.

29
New cards

air-gapped network

A network that is physically isolated from unsecured networks.

30
New cards

access control list (ACL)

A set of rules that control network traffic.

31
New cards

encryption

The process of converting data into a secure format.

32
New cards

symmetric encryption

Encryption using the same key for both encryption and decryption.

33
New cards

asymmetric encryption

Encryption using a public and private key pair.

34
New cards

hashing

A one-way transformation of data into a fixed-length string.

35
New cards

digital signature

A cryptographic method to verify authenticity and integrity.

36
New cards

VPN (Virtual Private Network)

A secure tunnel for encrypted communication over the internet.

37
New cards

Multi-Factor Authentication (MFA)

A security method requiring multiple forms of verification.

38
New cards

Single Sign-On (SSO)

A system allowing users to log in once and access multiple applications.

39
New cards

Access Token

A credential used to authenticate a user session.

40
New cards

Wireshark

Network packet analysis.

41
New cards

Nmap

Network scanning and reconnaissance.

42
New cards

Metasploit

A penetration testing framework.

43
New cards

Splunk

Security event logging and analysis.

44
New cards

tracert command

Shows the path packets take to a destination.

45
New cards

netstat command

Displays active network connections.

46
New cards

ipconfig command

Displays network adapter information.

47
New cards

GDPR

General Data Protection Regulation for protecting personal data in the EU.

48
New cards

HIPAA

A U.S. law protecting medical information.

49
New cards

PCI DSS

A security standard for handling credit card data.

50
New cards

SOC 2 compliance

A security framework for cloud and IT service providers.

51
New cards

Incident Response Plan (IRP)

A documented plan outlining how to detect, respond to, and recover from security incidents.

52
New cards

Six phases of the incident response lifecycle

Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.

53
New cards

Digital Forensics

The practice of investigating cyber incidents by analyzing digital evidence.

54
New cards

Chain of Custody in Digital Forensics

The process of maintaining a documented history of evidence handling.

55
New cards

Forensic Image

A bit-for-bit copy of a storage device for investigation.

56
New cards

Memory Forensics

The analysis of volatile memory (RAM) to detect malware or system intrusions.

57
New cards

Forensic Imaging Tool

FTK Imager or Autopsy.

58
New cards

Sandbox in Cybersecurity

A controlled environment for safely testing suspicious files or applications.

59
New cards

Live Analysis in Forensic Investigations

Examining an active system to gather evidence before shutdown.

60
New cards

Purpose of Log Analysis in Incident Response

To identify suspicious activity and security breaches.

61
New cards

Security Baseline

A set of minimum security configurations for a system.

62
New cards

Principle of 'Least Functionality'

Removing unnecessary services and applications to reduce attack surfaces.

63
New cards

Windows Group Policy

A tool used to enforce security settings on Windows machines.

64
New cards

Standard User vs Administrator Account

A standard user has limited permissions, while an administrator has full control over system settings.

65
New cards

Rootkit

Malware designed to gain privileged access and hide its presence on a system.

66
New cards

User Account Control (UAC) in Windows

A security feature that limits administrative privileges unless explicitly granted.

67
New cards

SELinux

A security module in Linux for enforcing access control policies.

68
New cards

Immutable Operating System

An OS that prevents changes to its core components to enhance security.

69
New cards

Patching

The process of applying updates to fix security vulnerabilities.

70
New cards

Endpoint Detection and Response (EDR) Solution

A tool for monitoring and responding to threats on individual devices.

71
New cards

WPA3

The latest Wi-Fi security standard that improves encryption and security.

72
New cards

MAC address spoofing

Changing a device's MAC address to impersonate another device.

73
New cards

rogue access point

An unauthorized wireless access point that poses a security risk.

74
New cards

public cloud

A public cloud is shared across multiple users, while a private cloud is dedicated to a single organization.

75
New cards

cloud encryption

Encrypting data stored in the cloud to prevent unauthorized access.

76
New cards

cloud security best practices

Use MFA, encrypt data, implement access controls, and monitor activity logs.

77
New cards

shared responsibility model in cloud security

A security framework where cloud providers and users both have security responsibilities.

78
New cards

Identity as a Service (IDaaS)

A cloud-based authentication and identity management service.

79
New cards

Infrastructure as Code (IaC)

Managing cloud infrastructure through code instead of manual configuration.

80
New cards

CASB (Cloud Access Security Broker)

A security tool that monitors and controls cloud-based applications.

81
New cards

tailgating in cybersecurity

When an unauthorized person follows an authorized person into a secure area.

82
New cards

pretexting

A social engineering tactic where attackers create a fake scenario to obtain information.

83
New cards

baiting in cybersecurity

Luring victims with fake offers or malicious USB devices.

84
New cards

shoulder surfing

Observing someone's screen or keyboard to steal credentials.

85
New cards

vishing

Voice phishing - using phone calls to trick victims into revealing sensitive information.

86
New cards

smishing

SMS phishing - using text messages to trick users into clicking malicious links.

87
New cards

best way to prevent social engineering attacks

Security awareness training and verifying identities before sharing sensitive information.

88
New cards

insider threat

A security risk posed by employees or contractors with access to sensitive data.

89
New cards

two-person integrity (TPI)

A security measure that requires two people to approve a critical action.

90
New cards

role of security awareness training

Educating employees on cybersecurity best practices to prevent attacks.

91
New cards

Threat Hunting

Proactively searching for cyber threats within an organization's network.

92
New cards

Cyber Threat Intelligence (CTI)

The collection and analysis of threat data to improve security defenses.

93
New cards

MITRE ATT&CK framework

A knowledge base of adversary tactics and techniques used in cyberattacks.

94
New cards

Security Operations Center (SOC)

A centralized unit responsible for monitoring and responding to security incidents.

95
New cards

Red Team vs. Blue Team

The Red Team simulates attacks, while the Blue Team defends against them.

96
New cards

Purple Teaming

A collaboration between Red and Blue Teams to improve security defenses.

97
New cards

security orchestration, automation, and response (SOAR)

To automate and streamline security processes.

98
New cards

advanced persistent threat (APT)

A long-term, targeted cyberattack by a sophisticated adversary.

99
New cards

cyber resilience

The ability to maintain security and recover quickly from cyber incidents.

100
New cards

best way to stay updated on cybersecurity threats

Follow security blogs, attend conferences, and participate in cybersecurity competitions.