course 8 – PUT IT TO WORK: PREPARE FOR CYBERSECURITY JOBS

Module 1: Protect Data and Communicate Incidents 

GOOGLE ADVANCED DATA ANALYTICS PROFESSIONAL CERTIFICATE

Complete Coursera Study Guide

INTRODUCTION – Protect Data and Communicate Incidents

In this comprehensive overview, participants will delve into the critical role of security professionals within the workplace, emphasizing the pivotal importance of their contributions to an organization’s security posture. The module sheds light on the significance of effective detection and escalation processes in safeguarding digital assets and maintaining a robust security environment.

Participants will gain a deeper understanding of the intricate dynamics involved in security operations and how the expertise of security professionals directly influences the overall resilience of an organization against evolving cybersecurity threats. This exploration serves as a foundational guide for individuals aspiring to join or advance in the field of cybersecurity, providing valuable insights into the integral role played by security professionals in ensuring the safety and integrity of organizational assets.

Learning Objectives

  • Recognize the importance of incident detection.
  • Describe the importance of various asset types.
  • Examine the relationship between events and incidents.
  • Determine incidents that need to be escalated to stakeholders.
  • Recognize the sensitive nature of secured assets and data.
  • Explain how having an ethical security mindset supports an entry-level security analyst’s ability to protect secured assets and data

TEST YOUR KNOWLEDGE: EVENT AND INCIDENT DETECTION

1. What does a security mindset enable a security analyst to do when protecting their organization? Select two answers. 

  • Evaluate risks and identify potential system breaches (CORRECT)
  • Approve social media connections from security professionals
  • Recognize what they are defending (CORRECT)
  • Evaluate employee retention

A security mindset enables an analyst to recognize what they are defending. It also helps them evaluate risks and identify potential system breaches.

2. Which type of asset would have the least impact on an organization if it were compromised?

  • Trade secrets
  • Guest Wi-Fi network (CORRECT)
  • Intellectual property
  • Financial information

A guest Wi-Fi network is an asset that would have the least impact on an organization if it were compromised because an organization’s business operations would experience little to no impact.

3. How can security analysts cultivate a security mindset?

  • By researching the latest security vulnerabilities (CORRECT)
  • By signing non-disclosure agreements (NDAs)
  • By sharing sensitive information with those who request it
  • By protecting public data from being accessed and shared

Security analysts can cultivate a security mindset by researching the latest security vulnerabilities. Staying updated about threats and vulnerabilities can help analysts take the necessary actions to prevent potential attacks from happening.

4. Which of the following examples describes the use of a security mindset? Select two answers.

  • Reporting suspicious emails
  • Downloading email attachments from unknown senders
  • Reusing passwords for multiple accounts
  • Exercising suspicion before opening email attachments (CORRECT)

Exercising suspicion before opening email attachments and reporting suspicious emails are examples of the use of a security mindset. A security mindset can help you identify and reduce security risks and potential incidents.

TEST YOUR KNOWLEDGE: YOUR IMPACT ON DATA PROTECTION

1. A security analyst notices that an employee has installed an app on their work device without getting permission from the help desk. The log indicates that potentially malicious code might have been executed on the host. Which of these security events should the security analyst escalate to a supervisor?

  • Neither event should be escalated.
  • The log indicating malicious code might have been executed on the host should be escalated.
  • Both events should be escalated. (CORRECT)
  • The employee installing an app without permission should be escalated.

Both events should be escalated to a supervisor. There are no issues that are too small or too big. It’s always best to err on the side of caution and report events to the appropriate team members.

2. Which are types of data and assets that stakeholders are most interested in protecting? Select two answers.

  • Company policies
  • Customers’ usernames and passwords (CORRECT)
  • Sensitive financial data (CORRECT)
  • Social media presence

Sensitive financial data and customers’ usernames and passwords are examples of data and assets that stakeholders are most interested in protecting.

3. Fill in the blank: When a security event results in a data breach, it is categorized as a _____.

  • security incident (CORRECT)
  • threat
  • vulnerability
  • asset

When a security event results in a data breach, it is categorized as a security incident. However, if the event is resolved without resulting in a breach, it is not considered an incident.

4. Which of the following are examples of the potential impact of a security incident involving malicious code? Select three answers.

  • Data protection
  • Loss of assets (CORRECT)
  • Operational downtime (CORRECT)
  • Financial consequences (CORRECT)

Operational downtime, financial consequences, and loss of assets are examples of the potential impact of a security incident involving malicious code.

MODULE 1 CHALLENGE

1. As a security analyst, you are responsible for protecting an organization’s low-level assets and high-importance assets. Which of the following is considered a low-level asset?

  • Company trade secrets
  • Intellectual property
  • Guest Wi-Fi network (CORRECT)
  • Customer email addresses

2. Which of the following statements best describes the relationship between a security mindset and asset protection?

  • A security mindset helps analysts protect high-importance assets.
  • A security mindset helps analysts protect low-level assets.
  • A security mindset helps analysts protect all levels of assets. (CORRECT)
  • A security mindset is not important for protecting assets.

3. Which of the following examples are considered public data? Select two answers.

  • Press releases (CORRECT)
  • Passport numbers
  • Product announcements (CORRECT)
  • Health insurance information

4. Fill in the blank: One of the most important concerns for most organizations is the protection of _____.

  • customer data (CORRECT)
  • guest Wi-Fi
  • job postings
  • social media

5. Fill in the blank: The decisions a security analyst makes can affect the organization that the analyst works for and other team members across the organization. These decisions also affect ______.

  • the analyst’s chance for a promotion
  • the customers of the organization that hired the analyst (CORRECT)
  • the financial markets
  • competitors in the industry

6. What are some ways that security analysts protect data? Select three answers.

  • Ignoring small events
  • Reporting small events (CORRECT)
  • Understanding the organization’s assets (CORRECT)
  • Paying attention to detail (CORRECT)

7. What is the correct term for a security event that results in a data breach?

  • Phishing incident
  • Compromised data
  • Security incident (CORRECT)
  • Data security event

8. Fill in the blank: An organization is responsible for protecting its customers’ sensitive data. Examples of the kinds of sensitive data that must be protected include ____ and _____. Select two answers.

  • private social media pages
  • bank statements (CORRECT)
  • social security numbers (CORRECT)
  • website URLs

9. Which of the following are the best examples of possible consequences of a data breach? Select two answers.

  • Improved hardware functionality
  • Regulatory fines (CORRECT)
  • Significant reduction in employee retention
  • Loss of credibility (CORRECT)

10. Which concept focuses on understanding how to evaluate risk and identify the potential for a breach of a system, application, or data?

  • Security analyst evaluation
  • Security recognition
  • Python knowledge
  • Security mindset (CORRECT)

11. Fill in the blank: Entry-level analysts can help protect low-level assets, such as an organization’s _____.

  • financial information
  • guest Wi-Fi network (CORRECT)
  • company job descriptions
  • trade secrets

12. Who will be affected by the decisions you make as a security analyst? Select two answers.

  • Competitors in the same industry
  • The financial markets
  • The customers of the organization that hired you (CORRECT)
  • The organization that hired you (CORRECT)

13. Fill in the blank: _____ must be protected at all times. An organization can lose its credibility with its customers if it is not properly protected.

  • Employee salaries
  • An organization’s termination policy
  • An organization’s social media page
  • Sensitive customer data (CORRECT)

14. Fill in the blank: A security mindset is the _____.

  • ability to help an organization’s human resources (HR) department remain compliant at all times
  • intent to provide quality security services to an organization’s development operations team
  • opportunity to showcase your Linux and other coding related technical skills
  • ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data (CORRECT)

15. As a security analyst, you are responsible for protecting an organization’s low-level assets and high-level assets. Which of the following is considered a high-level asset?

  • Company job descriptions
  • Public press releases
  • Guest Wi-Fi network
  • Intellectual property (CORRECT)

16. Fill in the blank: _____ are interested in protecting sensitive financial data, customers’ usernames and passwords, and third-party vendor security.

  • Social media influencers
  • Web programmers
  • HIPAA compliance officers
  • Stakeholders (CORRECT)

17. What are some examples of the customer data that security analysts protect? Select two answers.

  • Credit card numbers (CORRECT)
  • Product announcements
  • Newsletters
  • Passwords (CORRECT)

18. Which of the following defines a security incident?

  • A breach that disrupts the physical security of an organization
  • A security event that does not result in a data breach
  • A security event that results in a data breach (CORRECT)
  • A breach that disrupts the cloud security of an organization

19. Which of the following can cause a company to experience loss of credibility, financial loss, or regulatory fines?

  • The resignation of the company’s social media manager
  • Employee security awareness training
  • A data breach (CORRECT)
  • A cybersecurity awareness month phishing program

20. Which of the following is an essential way to maintain a security mindset?

  • Seek engineering mentors
  • Evaluate risks (CORRECT)
  • Work various security jobs with different organizations
  • Escalate major security issues within one week

21. Which of the following assets can be protected by adopting a security mindset? Select three answers.

  • Intellectual property (CORRECT)
  • Sensitive customer data (CORRECT)
  • Network equipment
  • Financial information (CORRECT)

22. Which of the following are examples of private data? Select two answers.

  • Customer bank account information
  • Government trade agreements
  • Employee identification numbers (CORRECT)
  • Employee email addresses (CORRECT)

23. What term is used to describe individuals of an organization who are interested in protecting sensitive financial data, customers’ usernames and passwords, and third-party vendor security?

  • Data managers
  • Stakeholders (CORRECT)
  • Information protection advisors
  • Executive security administrators

24. Fill in the blank: A security analyst should _____ escalate potential security events.

  • sometimes
  • rarely
  • always (CORRECT)
  • never

25. Fill in the blank: A security mindset helps a security analyst _____.

  • reinforce the expectations of security stakeholders
  • apply for an engineering role
  • recognize the difference between physical security and cybersecurity
  • defend against constant pressure from cyber attackers (CORRECT)

26. An employee at a healthcare company accesses a patient’s medical history and payment information to provide treatment. Which type of data is this classified as?

  • Public data
  • Sensitive data (CORRECT)
  • Confidential data
  • Private data

27. Fill in the blank: ____ can occur if an organization’s data and essential assets are compromised in a way that disrupts its business operations.

  • Public shame
  • Unsuccessful marketing campaigns
  • Cancellation of holiday work events
  • Financial loss (CORRECT)

CONCLUSION – Protect Data and Communicate Incidents

In conclusion, this comprehensive overview has provided valuable insights into various aspects of the cybersecurity domain. From foundational knowledge about operating systems and network security to advanced topics such as incident response and machine learning, participants have gained a well-rounded understanding of the multifaceted field of cybersecurity. The diverse range of courses covered in this program equips learners with essential skills, from using Linux and Python in cybersecurity tasks to mastering incident detection and response techniques.

By delving into the intricacies of threat modeling, network analysis, and the utilization of cybersecurity tools, participants are well-prepared to navigate the challenges of the cybersecurity landscape. The emphasis on hands-on experience, practical demonstrations, and real-world applications ensures that learners not only grasp theoretical concepts but also develop the practical skills necessary for success in cybersecurity roles. Overall, this program serves as a comprehensive and indispensable resource for those looking to embark on or advance in a cybersecurity career, offering a robust foundation and practical insights into the dynamic and ever-evolving field of cybersecurity.