Chapter 2
Introduction to Security Terminology
CERTIFICATION OBJECTIVES
2.01 Using Threat Intelligence
2.02 Identifying Threat Actors
2.03 Identifying Threat Vectors
2.04 Understanding Data Roles
QUESTIONS
Threat actors are the entities that enact malicious activities. Identifying threat actor types and their motivations is the first step in planning threat countermeasures.
Information is power. Sharing cybersecurity intelligence helps organizations craft meaningful security policies, and it enhances the efficacy of security monitoring and reporting tools. This includes identifying threat vectors such as e-mail systems, removable media, or cloud services. The protection of data assets is undertaken by a variety of roles, such ...
Get CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.