Cybersecurity Essentials - Chapter 1 (Cisco Networking Academy)
National Cybersecurity Workforce Framework
Categorizes and describes cyber jobs. It outlines tasks and skills require to become a specialist as well.
Securely Provision
Conceptualizing, designing, and building secure IT systems
Advanced Persistent Threat (APT)
Continuous computer hack that criminals usually choose for business or political motives. An APT occurs over a long period of time with a high degree of secrecy using sophisticated malware.
Vulnerability Broker
Gray hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards
Analyze
Highly specialized review and evaluation of incoming cybersecurity information to determine if it's useful for intelligence
Protect and Defend
Identification, analysis, and mitigation of threats to internal systems and networks
Packet forgery/packet injection
Interferes with an established network communication by constructing packets to appear as if they're part of a communication.
Investigate
Investigate cyber events and/or cybercrimes involving IT resources
Oversight and Development
Leadership, management, and direction to conduct cyber work effectively
Federated identity management
Multiple enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
7 categories of cyber work
Operate and Maintain, Protect and Defend, Investigate, Collect and Operate, Analyze, Oversight and Development, Securely Provision
Operate and Maintain
Providing the support, administration, and maintenance require to ensure IT system performance and security
Collect and Operate
Specialized denial and deception operations and the collection of cyber information
Algorithm attacks
Track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
DNS
Translates domain names into IP addresses
Packets
Transport data across a network/internet.
Telephone Denial-of-Service (TDoS)
Uses phone calls against a target telephone network tying up the system and preventing legitimate calls from getting through.