Cybersecurity Essentials - Chapter 1 (Cisco Networking Academy)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

National Cybersecurity Workforce Framework

Categorizes and describes cyber jobs. It outlines tasks and skills require to become a specialist as well.

Securely Provision

Conceptualizing, designing, and building secure IT systems

Advanced Persistent Threat (APT)

Continuous computer hack that criminals usually choose for business or political motives. An APT occurs over a long period of time with a high degree of secrecy using sophisticated malware.

Vulnerability Broker

Gray hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards

Analyze

Highly specialized review and evaluation of incoming cybersecurity information to determine if it's useful for intelligence

Protect and Defend

Identification, analysis, and mitigation of threats to internal systems and networks

Packet forgery/packet injection

Interferes with an established network communication by constructing packets to appear as if they're part of a communication.

Investigate

Investigate cyber events and/or cybercrimes involving IT resources

Oversight and Development

Leadership, management, and direction to conduct cyber work effectively

Federated identity management

Multiple enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.

7 categories of cyber work

Operate and Maintain, Protect and Defend, Investigate, Collect and Operate, Analyze, Oversight and Development, Securely Provision

Operate and Maintain

Providing the support, administration, and maintenance require to ensure IT system performance and security

Collect and Operate

Specialized denial and deception operations and the collection of cyber information

Algorithm attacks

Track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.

DNS

Translates domain names into IP addresses

Packets

Transport data across a network/internet.

Telephone Denial-of-Service (TDoS)

Uses phone calls against a target telephone network tying up the system and preventing legitimate calls from getting through.


Ensembles d'études connexes

Proquest Research Companion Library Quiz Module 7

View Set

SP302 - Introduction to Social and Developmental Psychology

View Set

Chapter 9_NEW! Mini Sim_Product Life Cycle MARK3300

View Set

PHYS1100: Final Exam Practice Questions

View Set

Hello. Начальный уровень.

View Set

art history correct test question examples

View Set