Day 8: Fundamental terms and definitions that underpin the cybersecurity realm. 📚

alice eneyoalice eneyo
1 min read

On Day 8 of the "Foundations of Cybersecurity" course on Coursera, l delved into crucial terms and definitions in cybersecurity. 📚

Here's a summary of the key concepts l covered:

- Hacktivist: A hacker who supports political or social causes.

- NIST (National Institute of Standards and Technology): Establishes essential cybersecurity standards.

- CSF (Cybersecurity Framework): NIST’s voluntary framework for managing cybersecurity risks.

- Privacy Protection: Safeguarding personal information from unauthorized access.

- Security Architecture: The framework for ensuring an organization's security posture.

- Security Control: Measures to reduce security risks.

- Security Ethics: Guidelines for responsible decision-making in cybersecurity.

- Security Framework: A structured approach for developing security programs and policies.

- Security Governance: Managing and directing security efforts within an organization.

- Assets: Valuable items that require protection.

- Compliance: Adhering to standards and regulations.

- CIA Triad: Confidentiality, Integrity, and Availability —the core principles of cybersecurity.

- HIPAA: Regulations for protecting health information in the U.S.

Understanding these terms is crucial for establishing a strong foundation in cybersecurity. Excited for Day 9 and the continued learning ahead!

#Cybersecurity #TermsAndDefinitions #LearningJourney #GRC #ContinuousLearning

0
Subscribe to my newsletter

Read articles from alice eneyo directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

alice eneyo
alice eneyo

Compliance Analyst with 2+ years of hands-on experience driving risk assessments, regulatory compliance, and governance initiatives across GRC frameworks including ISO 27001, NIST SP 800-53, SOC 2, and GDPR. Adept at developing and enforcing security policies, conducting internal audits, maintaining risk registers, managing third-party compliance, and supporting ISO 27001 certification readiness. Strong understanding of cybersecurity best practices and risk mitigation strategies. Known for strengthening operational resilience through proactive governance and cross-functional collaboration. Actively seeking opportunities in Compliance, GRC (Governance, Risk & Compliance), or Cybersecurity Analyst roles.