Coursera Cybersecurity

Ace your homework & exams now with Quizwiz!

ethical principles in security

- Confidentiality - Privacy protections - Laws

4 core components for security frameworks

1. Identify and document security goals 2. set guidelines to achieve security goals 3. Implement strong security processes 4. Then monitoring and communicating the results

Hacktivist

A person who uses hacking to achieve a political goal

Network protocol analyzer (packet sniffer)

A tool designed to capture and analyze data traffic within a network

Security architecture

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats

NIST Cybersecurity Framework (CSF)

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

SIEM tools- Security Information and Event Management.

An application that collects and analyzes log data to monitor critical activities in an organization

Center for Internet Security (CIS®)

CIS is a nonprofit with multiple areas of emphasis. It provides a set of controls that can be used to safeguard systems and networks against attacks. Its purpose is to help organizations establish a better plan of defense. CIS also provides actionable controls that security professionals may follow if a security incident occurs.

security ethics

Guidelines for making appropriate decisions as a security professional

Splunk

SIEM tool, the best log data information gathering and analysis tool that imports machine-generated data with an add-on

privacy protections

Safeguarding personal information from unauthorized use

Security Controls

Safeguards designed to reduce specific security risks

General Data Protection Regulation (GDPR)

a European Union (E.U.) general data regulation that protects the processing of E.U. residents' data and their right to privacy in and out of E.U. territory.

The Federal Risk and Authorization Management Program (FedRAMP®)

a U.S. federal government program that standardizes security assessment, authorization, monitoring, and handling of cloud services and product offerings.

The Health Insurance Portability and Accountability Act (HIPAA)

a U.S. federal law established in 1996 to protect patients' health information. Governed by 3 rules, privacy, security, and breach notification

chronicle

a cloud-native SIEM tool that stores security data for search and analysis.

Playbooks

a manual that provides details about any operational action, such as how to respond to an incident.

log

a record of events that have occurred in a system

The Federal Energy Regulatory Commission - North American Electric Reliability Corporation (FERC-NERC)

a regulation that applies to organizations that work with electricity or that are involved with the U.S. and North American power grid.

System and Organizations Controls (SOC type 1, SOC type 2)

a series of reports that focus on an organization's user access policies at different organizational levels such as: supervisor, manager, executive, etc.

Payment Card Industry Data Security Standard (PCI DSS)

an international security standard meant to ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment.

asset

an item perceived as having value to an organization.

International Organization for Standardization (ISO)

establishes international standards related to technology, manufacturing, and management across borders.

CIA triad (Confidentiality, Integrity, Availability)

foundational model that informs how organizations consider risk when setting up systems and security policy

Security frameworks

guidelines used for building plans to help mitigate risks and threats to data and privacy.

Protected health information (PHI)

information that can be used to identify a person and relates to his or her past, present, or future physical or mental condition, including any health care the patient has had, or payment for that health care

SIEM tools collect ...

it collects real-time, or instant, information and allow security analysts to identify potential breaches as they happen.

availability

means that data is accessible to authorized users.

Confideniality

means that only authorized users can access specific assets for data

integrity

means the data is correct, authentic, and reliable.

compliance

process of adhering (sticking) to internal standards and external regulations


Related study sets

Combo with Amsco AP US History Chapter 17 and 1 other

View Set

CompTIA A+ Core 1: Activity 10-3

View Set

Microbiology Chapter 4 Questions ❤️

View Set

Chapter 7: Group Influences on Consumer Behavior

View Set

Finance 8 Personal Finance - Ch 2 Money Management Skills - Focus on Personal Finance - McGraw Hill 5 edition

View Set

The Circulatory System: Blood Vessels and Circulation

View Set

vanskelige ord - du må ikke sove!

View Set