Unlock Your Carrier in Cybersecurity en B61b135a27
Unlock Your Carrier in Cybersecurity en B61b135a27
04
Cybersecurity is the practice of protecting digital infrastructure
and defending networks, communications, devices, and data Sign up for courses in advanced
in cyberspace from dangers, threats, and criminal hackers. math, science, or creative
subjects like writing and art.
05
Ask your guidance counselor
about Cybersecurity career
opportunities.
01 02
Get Started! Career Options
Explore the following specializations and write a brief description:
Classes to take in Advanced Math Science.
high school Cryptographer / Cryptanalyst Cyber Defense Incident
Creative Writing (English/Arabic and Communication).
aka Encryption Expert. Responder.
Technology Ethics.
IT-related subjects.
Cybersecurity.
My Notes
03 04
Information Systems Security Multi-Disciplined Language Cyber Crime Investigator. Technical Support Specialist.
Manager. Analyst.
Software Developer. Vulnerability Assessment Cyber Operator. System Testing & Evaluation
Analyst. Specialist.
05 06
Cyber OPS Planner. Information Assurance Analyst.
07
Cyber-tionary
Below are 27 essential Cybersecurity terms along with their definitions that
you can learn to start your Cybersecurity knowledge:
01 Cybersecurity
The protection of networks, information technology systems, operational
technology systems, and their components, including hardware and
software, the services they provide, and the data they contain, from any
unauthorized access, disruption, modification, or exploitation. The concept of
cybersecurity encompasses information security, electronic security, digital
security, and more.
02 Cyberspace
The interconnected network of information technology infrastructure,
including the Internet, communication networks, computer systems, and
Internet-connected devices; along with the associated hardware and
control devices.
08
04 Availability 08 Accountability
Ensuring access and use on demand by an authorized user, process, or The ability to trace the path of a specific activity or event back to the
system in a reliable manner. responsible party, the originator of the activity. This supports non-repudiation,
fault diagnosis, intrusion detection and prevention, and post-detection
05 Integrity
actions such as recovery and legal proceedings.
09 Authentication
Protection against unauthorized modification or destruction of information,
and also includes ensuring non-repudiation of information and authenticity.
Verifying the identity of a user, process, or device, and is often a prerequisite
for granting access to technical resources. It is not related to determining
06 Confidentiality access rights to technical resources and assets.
The property of non-disclosure of information to an unauthorized user,
process, or system except in the event of authorization to access it.
10 Multi-Factor Authentication
A security system that verifies the identity of a user; it requires the use of
My Notes
09 10
11 Authorization 15 Defense-in-Depth
Defining the rights/licenses to access information and technical resources for A concept that means clearly defining multiple defensive layers of security
the entity in general, and controlling and verifying access levels in particular. controls through integration between people, technology, and operational
capabilities.
12 Assets
Tangible or intangible resources that are valuable to the organization. 16 Cyber Attack
Including employees, technologies, facilities, patents, software and services, The unauthorized exploitation of computer systems, networks, and
information and characteristics (such as the organization’s reputation, organizations that rely on information and communications technology
identity, and cognitive or professional capabilities). for the purpose of causing harm. It includes any type of malicious activity
that attempts to gain unauthorized access to, disable, prevent, or destroy
13
information system resources or the information itself.
Cryptography
Rules that include principles, means, and methods for storing and transmitting
data or information in a specific form in order to hide its semantic content
17 Distributed Denial-of-Service (DDoS) Attack
and prevent unauthorized use and undetected modification, so that Attempts to disable the system and make its services unavailable by sending
unauthorized persons cannot read or process it. a large number of requests from multiple sources at the same time.
An organization’s overall ability to withstand, absorb, and recover from cyber Masquerading as trusted entities through email messages to obtain
incidents in a timely manner. sensitive information, such as usernames, passwords, or credit card details,
for malicious and harmful purposes.
My Notes My Notes
11 12
19 Threat Intelligence 24 Firewall
Organized information that has been analyzed about recent, current, and Hardware or software that restricts network data traffic according to a set of
potential attacks that could pose a cyber threat to the organization. access control rules that govern what is allowed and what is not.
My Notes My Notes
13 14
With Regards
NATIONAL CYBER SECURITY CENTER
www.ncsc.gov.bh
#CyberWiser
COPYRIGHT © 2024
NCSC ALL RIGHTS RESERVED