# Wrap-up; terms and definitions from course 5, week 1

<div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-well-done%21-you-made-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Well done! You made it to the end of this section!" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Well done! You made it to the end of this section! </span></div><div aria-label="toggle video from Being a security practitioner" class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Being a security practitioner </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">takes commitment and a desire to learn. </span></div><div aria-label="toggle video from A big part of the job involves keeping current with" class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">A big part of the job involves keeping current with </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">best practices and emerging trends. </span></div><div aria-label="toggle video from Thinking back on my own journey" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Thinking back on my own journey </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">into the world of security, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm so proud of you for your continued commitment. </span></div><div aria-label="toggle video from We've covered a lot of material this week, and" class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We've covered a lot of material this week, and </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">this is a good time to reflect and look back </span></div><div aria-label="toggle video from on the key concepts we explored together." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">on the key concepts we explored together. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-we-covered-the-build"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from We covered the building blocks of" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We covered the building blocks of </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">organizational risk management: </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">assets, threats, and vulnerabilities. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--1"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-we-also-spent-some-t"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from We also spent some time demonstrating" class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">We also spent some time demonstrating </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the importance of asset inventories. </span></div><div aria-label="toggle video from It's much easier to protect company assets if" class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">It's much easier to protect company assets if </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you know where they are and who's responsible for them. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-after-that%2C-we-moved"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from After that, we moved on to explore" class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">After that, we moved on to explore </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the challenges in a rapidly changing digital world. </span></div><div aria-label="toggle video from Part of protecting data in this world" class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Part of protecting data in this world </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">is understanding if it's in use, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">in transit, or at rest. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--3"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-finally%2C-in-our-high"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Finally, in our high-level exploration" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Finally, in our high-level exploration </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">of policies, standards, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and procedures, we talked about </span></div><div aria-label="toggle video from how each of them factor into achieving security goals." class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">how each of them factor into achieving security goals. </span></div><div aria-label="toggle video from There's no one-size-fits-all" class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There's no one-size-fits-all </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">approach to achieving security. </span></div><div aria-label="toggle video from While exploring the NIST Cybersecurity Framework," class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">While exploring the NIST Cybersecurity Framework, </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">you gained an appreciation of how it </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">supports good security practices. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--4"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk-attackers-are-also-c"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Attackers are also constantly building their skills" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Attackers are also constantly building their skills </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">and finding new ways to break </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">through the defenses we put up. </span></div><div aria-label="toggle video from Remember, the landscape is always changing." class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Remember, the landscape is always changing. </span></div><div aria-label="toggle video from There's always more to learn if you want" class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">There's always more to learn if you want </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to be a good security practitioner. </span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2" id="bkmrk--5"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item">  
</div></div><div class="cds-1 css-arowdh cds-3 cds-grid-item cds-48 cds-73" id="bkmrk-next-up%2C-we%27re-going"><div><div class="rc-TranscriptHighlighter css-79elbk"><div class="rc-Transcript css-9li235" data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="interactive_transcript" data-track-page="item_layout" role="presentation"><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-1lz62pp cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from Next up, we're going to expand" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">Next up, we're going to expand </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">our security mindset by learning more about </span><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">the different systems security teams use </span></div><div aria-label="toggle video from to protect organizational assets." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">to protect organizational assets. </span></div><div aria-label="toggle video from I'm looking forward to it!" class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-80vnnb cds-139">I'm looking forward to it! </span></div></div></div></div></div></div></div></div>## **Glossary terms from week 1**

**Asset:** An item perceived as having value to an organization

**Asset classification:** The practice of labeling assets based on sensitivity and importance to an organization

**Asset inventory:** A catalog of assets that need to be protected

**Asset management:** The process of tracking assets and the risks that affect them

**Compliance:** The process of adhering to internal standards and external regulations

**Data:** Information that is translated, processed, or stored by a computer

**Data at rest:** Data not currently being accessed

**Data in transit:** Data traveling from one point to another

**Data in use:** Data being accessed by one or more users

**Information security (InfoSec):** The practice of keeping data in all states away from unauthorized users

**National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF):** A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

**Policy:** A set of rules that reduce risk and protect information

**Procedures:** Step-by-step instructions to perform a specific security task

**Regulations:** Rules set by a government or other authority to control the way something is done

**Risk**: Anything that can impact confidentiality, integrity, or availability of an asset

**Standards:** References that inform how to set policies

**Threat:** Any circumstance or event that can negatively impact assets

**Vulnerability:** A weakness that can be exploited by a threat

<div class="cds-1 css-hcqebr cds-3 cds-grid-item cds-48 cds-66" id="bkmrk--6"><div class="cds-569 cds-formControl-root css-4p0j7c cds-572">  
</div></div>