CYB2001 Final Exam

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/92

flashcard set

Earn XP

Description and Tags

Flashcards for CYB2001 Final Exam Review

Last updated 11:15 AM on 5/16/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

93 Terms

1
New cards

CUI

Controlled Unclassified Information

2
New cards

FCI

Federal Contract Information

3
New cards

PII

Personally Identifiable Information

4
New cards

PCI CHD

Payment Card Industry Cardholder Data

5
New cards

PHI (ePHI)

Protected Health Information and Electronic Protected Health Information (HIPAA-related data)

6
New cards

IP

Intellectual Property

7
New cards

ITAR

International Traffic in Arms Regulation

8
New cards

Confidentiality

Ensures that unauthorized individuals cannot gain access to sensitive information

9
New cards

Integrity

Ensures there are no unauthorized or illegitimate modifications to data

10
New cards

Availability

Ensures information and systems are ready to meet the needs of legitimate users

11
New cards

Asset

Something we protect

12
New cards

Threat

Some outside force that could do us harm

13
New cards

Vulnerability

Some negative quality of our asset

14
New cards

Risk

The unwanted outcome that could occur by a threat and a vulnerability coming together on our asset

15
New cards

Firewall

Protects “good internal systems from the bad internet”

16
New cards

High Availability Firewalls (HAFs)

Apply two firewalls in a system; in case one fails, the second firewall stands in its place.

17
New cards

Web Application Firewalls (WAFs)

Protect our web apps from the “bad” public internet.

18
New cards

Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS)

Detect and prevent break-ins.

19
New cards

Honeypot

Systems that have no actual purpose, other than to raise an alarm if someone interacts with it.

20
New cards

Data Backups

A system that replicates our data, either physically onsite, remotely at a service provider, or both.

21
New cards

Traditional AV

Signature-based anti-virus software.

22
New cards

Next-generation AV

Endpoint Detection and Response (EDR) – signature and behavior-based, machine learning capabilities.

23
New cards

SOC

Security Operations Center – 24/7 cybersecurity monitoring by a security team.

24
New cards

SIEM

Security Information and Event Management (logging and data correlation).

25
New cards

SOAR

Security Orchestration and Response (automation tooling)

26
New cards

DLP

Data loss prevention (ensures our data stays with us)

27
New cards

FIM

File integrity monitoring (detects file changes)

28
New cards

Email Security Gateways

Protect email systems from users clicking bad URLs, attachments, phishing. Builds in sandboxes for securely detonating malware.

29
New cards

Vulnerability scanners

Performs vulnerability scanning/automated security checks.

30
New cards

Secrets manager

Password safe/key management tools.

31
New cards

GRC tools

Tools for managing risk and compliance to-do’s, status, audit evidence, etc.

32
New cards

Symmetric Encryption

Uses the same key to decrypt and encrypt

33
New cards

Asymmetric Encryption

Uses different keys to decrypt and encrypt

34
New cards

Script Kiddies

Generally unskilled, novice, “mom’s basement” hackers

35
New cards

Hacktivists

Hack for a “cause” they care about

36
New cards

Nation States

Known as Advanced Persistent Threats, APTs; generally includes terrorist groups

37
New cards

Insider Threats

Accidental human error, negligence, or purposeful/deliberate actions

38
New cards

Ransomware

Stealing and ransom’ing data by encrypting files with malware and extorting the victim

39
New cards

Business Email Compromise (BEC)

Hijacking emails/email accounts

40
New cards

Denial of Service (DOS/DDOS)

Impacting Service Availability

41
New cards

Supply Chain Attacks

Impacting your security by hacking the vendors and third-party services/products you use

42
New cards

Vulnerability Scanning

Using tools to “knock on the door”, see what’s in our environments, open ports, what services are running, patch levels

43
New cards

Penetration Testing

Human-led testing to “break the door down”, often outsourced. Simulates an attacker.

44
New cards

Threat Modeling

Analyzing potential threats and vulnerabilities

45
New cards

Defense in Depth/Layered Security

Implementing multiple layers of security controls

46
New cards

Network Segmentation

Using subnets/VLANs (virtual LANs), and other methods, to split up the environment so the network isn’t “flat”.

47
New cards

GRC

Governing IT and IT security, risk management, and compliance.

48
New cards

ARO

Annual Rate of Occurrence – how many times in a year something will need to be done

49
New cards

SLE

Single Loss Expectancy - How much it costs to replace something one-time

50
New cards

ALE

Annual Loss Expectancy – How much it costs to replace something in a given year

51
New cards

Risk acceptance

Making no changes in the face of risk

52
New cards

Risk mitigation

Implementing additional security features to reduce risk

53
New cards

Risk avoidance

Deciding not to do something any longer to avoid the risk

54
New cards

Risk transference

Shifting the risk away from yourself, such as purchasing cyber or flood insurance, or outsourcing some functionality to a service provider instead of doing it yourself

55
New cards

Information Security Policy

Broadly defines the why and what of an organization’s cyber objectives “don’t do this thing because it’s bad”

56
New cards

Standards

Quantifiable measures that define the what and how “check the firewall rules once per month..”

57
New cards

Procedures

Specific steps “during a security incident, do this checklist”

58
New cards

Guidelines

Recommendations and best practices “keep these items in mind when doing this activity”

59
New cards

NIST CSF

A general cybersecurity framework applicable to almost any type of organization. Developed by NIST, the US Government standards body.

60
New cards

NIST RMF

A general risk management framework, developed by NIST.

61
New cards

NIST PF

A general data privacy framework from NIST.

62
New cards

HIPAA/HITECH/HITRUST

Compliance standards, frameworks and law for Healthcare Security.

63
New cards

CMMC

Cybersecurity Maturity Model Certification, built heavily from NIST SP 800-171. The government’s requirements for their defense contractors.

64
New cards

FedRAMP

Secure development framework for protecting software sold to the government

65
New cards

FFIEC/GLBA

Federal Financial Institutions Examination Council Gramm Leach Bliley Act Compliance standards and law for banking/finance security

66
New cards

SOX

Sarbanes Oxley. Law for publicly traded companies

67
New cards

PCI DSS/PCI SSF

Payment Card Industry Data Security Standard Compliance standard for credit/debit card payments security Payment Card Industry Software Security Framework Compliance standard for security in payment software

68
New cards

COBIT

General IT management framework developed by auditors

69
New cards

ITIL

General IT management framework

70
New cards

SOC

Service Organization Controls. A compliance standard for showing your clients that you are handling security well.

71
New cards

NERC CIP

Cybersecurity in electric generation utilities

72
New cards

Identification

Determining a security event has occurred

73
New cards

Preservation

Ensuring evidence is not destroyed

74
New cards

Collection

Acquiring the evidence

75
New cards

Examination & Analysis

Reviewing the evidence

76
New cards

Attribution

Determining who did it

77
New cards

Presentation

The final investigation report

78
New cards

IRP

Incident Response Plan; what to do if a network has been ransomeware’d

79
New cards

DRP

Disaster Recovery Plan; what to do if a building caught fire overnight, or flooded

80
New cards

Evasion

AI Security Attack type

81
New cards

Poisoning

AI Security Attack type

82
New cards

Extraction

AI Security Attack type

83
New cards

Inference

AI Security Attack type

84
New cards

Prompt Injection

AI Security Attack type

85
New cards

Zero Trust

Utilizes real-time, continuous authentication practices, assumes “the network is always hostile”

86
New cards

SRP Triad

Safety, Reliability, Performance in Operational Technology Security

87
New cards

GDPR

General Data Protection Regulation, the European Union’s and United Kingdom’s Data Security and Privacy regulation.

88
New cards

PIPEDA

Canada’s data security and privacy law

89
New cards

PIPL

China’s data security and privacy law

90
New cards

CFAA

Computer Fraud and Abuse Act – making it illegal to hack or commit computer crime

91
New cards

ECPA

Electronic Communications Privacy Act – makes it illegal to hack or wrongly intercept telecommunications – phone calls, data, emails, etc.

92
New cards

FERPA

Family Educational Rights and Privacy Act – Protects student data

93
New cards

CCPA/CPRA

California’s Data Privacy Laws. The most substantial state privacy laws in the US.