Foundations of Cybersecurity Mod 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

flashcard set

Earn XP

Description and Tags

Google Cybersecurity Professional Certificate

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Cybersecurity

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access

2
New cards

Threat actor

any person or group who presents a security risk

3
New cards

Benefits of security

protects from internal and external threats

maintains and improves business productivity

reduces expenses

maintains brand trust

reduces expenses

4
New cards

external threat

someone outside of the organization who is trying to gain access to private information

5
New cards

internal threat

a risk originating from within the organization, such as employees or contractors, that compromises data security. Can be accidental or intentional

6
New cards

Common security based roles

security analyst or specialist

security operations center analyst (SOC)

Information security analyst

7
New cards

job responsibilities of entry level security analyst

monitoring and protection information and systems

installing prevention software

conducting security audits

reviewing organizations security record and other documents

8
New cards

security professional duties

operations: responding to detections and doing investigations

projects: working with other teams to build or improve detections

9
New cards

compliance

adhering to laws, regulations, and standards related to information security and privacy

10
New cards

security frameworks

structured guidelines for managing security risks and controls.

11
New cards

security posture

a measure of an organizations ability to manage its defense of critical assets and data and react to change

12
New cards

security controls

the safeguards or countermeasures implemented to protect assets and reduce security risks. Used with security frameworks to build a strong security posture

13
New cards

network security

the practice of keeping an organizations network infrastructure secure from unauthorized access

14
New cards

Cloud security

The process of ensuring assets stored in the cloud are properly configured and access to those assets is limited to authorized users

15
New cards

The cloud

a network made up of a collection of servers or computers that store resources and data in remote physical locations that can be accessed with the internet

16
New cards

programming

a process that can be used to create a specific set of instructions for a computer to execute tasks

17
New cards

Confidentiality

ensures sensitive information is accessed only by authorized individuals

18
New cards

integrity

guarantees data remains accurate and unalted by unauthorized users

19
New cards

availability

ensures information and resources are accessible to authorized users when needed

20
New cards

CIA triad

a model that defines the three core principles of cybersecurity: confidentiality, integrity, and availability.

21
New cards

Malware

software designed to harm devices or networks.

22
New cards

Virus

Malicious code written to interfere with computer operations and cause damage to data and software. Needs to be downloaded by a user.

23
New cards

Social engineering

a manipulation technique that exploits human error to gain private information, access, or valuables

24
New cards

Phishing

the use of digital communications to trick people into revealing sensitive data or deploying malicious software

25
New cards

Business Email Compromise (BEC)

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage

26
New cards

Spear Phishing

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source

27
New cards

Whaling

A form of spear phishing. Threat actors target company executives to gain access to sensitive data

28
New cards

Vishing

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

29
New cards

Smishing

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source

30
New cards

Worm

Malware that can duplicate and spread itself across systems on its own. Does not need to be downloaded by a user.

31
New cards

Ransomware

A malicious attack where threat actors encrypt an organization's data and demand payment to restore access

32
New cards

Spyware

Malware that’s used to gather and sell information without consent

33
New cards

Social media phishing

A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack

34
New cards

Watering hole attack

A threat actor attacks a website frequently visited by a specific group of users

35
New cards

USB bating

A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network

36
New cards

Physical social engineering

A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

37
New cards

Risk management

The process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events