# Glossary terms from week 1

#   


## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Terms and definitions from Course 1, Week 1**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cybersecurity (or security):** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Cloud security:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Internal threat:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A current or former employee, external vendor, or trusted partner who poses a security risk</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Network security:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The practice of keeping an organization's network infrastructure secure from unauthorized access</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Personally identifiable information (PII):**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Any information used to infer an individual’s identity</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Security posture:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> An organization’s ability to manage its defense of critical assets and data and react to change </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Sensitive personally identifiable information (SPII):**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> A specific type of PII that falls under stricter handling guidelines</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Technical skills:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Skills that require knowledge of specific tools, procedures, and policies </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Threat:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Any circumstance or event that can negatively impact assets</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Threat actor:** </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Any person or group who presents a security risk</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Transferable skills:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Skills from other areas that can apply to different careers </span>