07-Common Cybersecurity Terminology
07-Common Cybersecurity Terminology
Compliance is the process of adhering to internal standards and external regulations and
enables organizations to avoid fines and security breaches.
Security frameworks are guidelines used for building plans to help mitigate risks and threats
to data and privacy.
Security controls are safeguards designed to reduce specific security risks. They are used with
security frameworks to establish a strong security posture.
Security posture is an organization’s ability to manage its defense of critical assets and data
and react to change. A strong security posture leads to lower risk for the organization.
A threat actor, or malicious attacker, is any person or group who presents a security risk. This
risk can relate to computers, applications, networks, and data.
Cloud security is the process of ensuring that assets stored in the cloud are properly
configured, or set up correctly, and access to those assets is limited to authorized users. The
cloud is a network made up of a collection of servers or computers that store resources and
data in remote physical locations known as data centers that can be accessed via the internet.
Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection
of data, applications, and infrastructure in the cloud.
Programming is a process that can be used to create a specific set of instructions for a
computer to execute tasks. These tasks can include:
Key takeaways
Understanding key technical terms and concepts used in the security field will help prepare
you for your role as a security analyst. Knowing these terms can help you identify common
threats, risks, and vulnerabilities. To explore a variety of cybersecurity terms, visit the
National Institute of Standards and Technology glossary
. Or use your browser to search for high-quality, reliable cybersecurity glossaries from
research institutes or governmental authorities. Glossaries are available in multiple
languages.