Costas Nicou Back Office

Cybersecurity – Week 1 Notes

Cyber security is the practice of ensuring confidentiality, integrity and availability of information by protecting networks,devices, people and data from unauthorized access or criminal exploitation.

Threat actor is any person or group who presents a security risk

Personally Identifiable Information or ( PII ) is any information used to infer an individual’s identity (may include full name,phone,email)

Sensitive Personally Identifiable Information ( SPII ) is a specific type of PII that falls under stricter handling guidelines (may include social security numbers, medical or financial information and bio metric data such as facial recognition)

When a person’s identifiable information is compromised leaked or stolen identity theft is the primary concern.

Identity theft is the act of stealing personal information to commit fraud while impersonating a victim. The primary objective of identity theft is financial gain.

Security Information and Event Management (SIEM) tools help analysts better understand security threats, risks, and vulnerabilities.

Glossary terms from week 1

Terms and definitions from Course 1, Week 1

Cybersecurity (or security): The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

Cloud security: The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

Internal threat: A current or former employee, external vendor, or trusted partner who poses a security risk

Network security: The practice of keeping an organization’s network infrastructure secure from unauthorized access

Personally identifiable information (PII): Any information used to infer an individual’s identity

Security posture: An organization’s ability to manage its defense of critical assets and data and react to change

Sensitive personally identifiable information (SPII): A specific type of PII that falls under stricter handling guidelines

Technical skills: Skills that require knowledge of specific tools, procedures, and policies

Threat: Any circumstance or event that can negatively impact assets

Threat actor: Any person or group who presents a security risk

Transferable skills: Skills from other areas that can apply to different careers