Key Concepts in Cybersecurity and Access Control

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/127

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

128 Terms

1
New cards

AAA (Authenticating, Authorizing, Accounting)

A framework used for controlling access to computer resources, enforcing policies, and auditing usage.

2
New cards

Authenticating

Verifying the identity of a user or device.

3
New cards

Authorizing

Determining if the authenticated user has permission to access the requested resource.

4
New cards

Accounting

Tracking the usage of resources by the user.

5
New cards

Access Control List (ACL)

A list of permissions attached to an object (e.g., file, network resource) specifying which users or systems are allowed to access it and the type of access they have.

6
New cards

Access Control Vestibule

A small entry area, often with controlled access, used to prevent unauthorized entry into a more secure area.

7
New cards

Alarm System

A system designed to detect unauthorized access, intrusion, or threats and alert security personnel or systems.

8
New cards

Anti-Malware Software

Software designed to detect, block, and remove malicious software (malware), such as viruses, worms, and trojans.

9
New cards

Anti-Phishing Training

Educating users on how to recognize and avoid phishing attacks, which are attempts to steal sensitive information by impersonating legitimate sources.

10
New cards

Antivirus Software

Software designed to detect and remove viruses and other malicious software from a computer or network.

11
New cards

ATA Secure Erase

A function in modern hard drives that securely deletes all data, ensuring that it cannot be recovered.

12
New cards

Authenticator App

An app that generates time-based, one-time passwords (TOTP) used for two-factor authentication (2FA) to secure online accounts.

13
New cards

Badge Reader

A device used to read identification badges or smartcards to grant access to restricted areas.

14
New cards

Biometric Data

Unique physical characteristics (e.g., fingerprints, retina scans, voiceprints) used to identify individuals.

15
New cards

Biometric Lock

A lock system that uses biometric data, such as a fingerprint or facial recognition, to grant access.

16
New cards

Bollards

Short, sturdy posts used to block or limit vehicle access to a certain area, often as part of security measures.

17
New cards

Boot Sector Virus

A virus that infects the boot sector of a computer's hard drive, often making it difficult to detect and remove.

18
New cards

Botnet

A network of compromised computers controlled by a hacker to perform malicious actions, such as sending spam or launching distributed denial-of-service (DDoS) attacks.

19
New cards

Brute Force Attack

A hacking attempt where every possible combination of passwords is tried until the correct one is found.

20
New cards

Cable Lock

A physical security device used to tether a laptop or other portable device to a stationary object to prevent theft.

21
New cards

Certificate Authority (CA)

An organization that issues digital certificates used to verify the identity of websites, servers, or individuals.

22
New cards

Certificate Manager

A system or tool used to manage digital certificates, ensuring that they are properly issued, stored, and renewed.

23
New cards

Certificate of Destruction

A document confirming that data has been securely destroyed, often required by organizations to comply with regulatory requirements.

24
New cards

Chain of Custody

The documented process that tracks the handling and storage of evidence, ensuring that it hasn't been tampered with.

25
New cards

Closed-source Software

Software whose source code is not made publicly available and is owned by an individual or company.

26
New cards

Commercial Use License

A software license that permits the use of the software in a commercial or business environment.

27
New cards

Copyright

A legal right granted to the creator of an original work, protecting it from unauthorized reproduction or distribution.

28
New cards

Cross-Site Scripting (XSS)

A security vulnerability in web applications where attackers inject malicious scripts into web pages viewed by other users.

29
New cards

Crypto Miner

A program or device used to mine cryptocurrency, often using significant computational resources.

30
New cards

Cryptojacking

The unauthorized use of someone's computer to mine cryptocurrency.

31
New cards

Data Loss Prevention (DLP)

Strategies and technologies designed to prevent unauthorized access, use, or transmission of sensitive data.

32
New cards

Data Retention

The practice of storing data for a specified period, often governed by regulatory policies or legal requirements.

33
New cards

Defense in Depth

A layered security strategy that uses multiple defensive measures to protect data and resources.

34
New cards

Degausser

A device used to erase data from magnetic storage media (e.g., hard drives, tapes) by using a powerful magnetic field.

35
New cards

Denial of Service (DoS)

An attack that floods a system or network with excessive traffic to make it unavailable to users.

36
New cards

Dictionary Attack

A method of attacking passwords by systematically entering every word in a prearranged list (a dictionary) to guess the correct password.

37
New cards

Digital Certificate

An electronic document used to prove the ownership of a public key, often issued by a certificate authority.

38
New cards

Digital Rights Management (DRM)

Technologies used to control how digital content (e.g., music, movies, software) can be used, copied, or distributed.

39
New cards

Disk Drive Shredder

A physical device that destroys hard drives or storage devices, rendering them unusable and ensuring data cannot be recovered.

40
New cards

Distributed Denial of Service (DDoS)

An attack that uses multiple systems to flood a network or server with traffic, overwhelming it and causing it to become unavailable.

41
New cards

Dumpster Diving

The practice of searching through trash or discarded materials to find sensitive information, such as financial documents or passwords.

42
New cards

Email Filtering

The process of automatically categorizing or blocking unwanted or malicious emails, such as spam or phishing attempts.

43
New cards

Email Hoax

A type of fraudulent email that spreads false information or requests actions, such as forwarding the email to others.

44
New cards

End User License Agreement (EULA)

A contract between the software vendor and the end user that outlines the terms under which the software can be used.

45
New cards

Entry Control Roster

A log or list used to track individuals entering and leaving a secured area.

46
New cards

Evil Twin

A fraudulent Wi-Fi access point that mimics a legitimate one in order to intercept sensitive data from users who connect to it.

47
New cards

First Response

The initial actions taken in response to a security incident or breach, often involving containment and assessment.

48
New cards

Grayware

Software that is not malicious but may cause undesirable behavior, such as adware or tracking software.

49
New cards

Hard Token

A physical device used for two-factor authentication, generating a one-time password or other form of secure login.

50
New cards

Impersonation

A social engineering attack in which a malicious actor pretends to be someone else to gain unauthorized access to systems or data.

51
New cards

Incident

Any event that could compromise the confidentiality, integrity, or availability of an organization's systems or data.

52
New cards

Incident Documentation

The process of recording details about a security incident, including timelines, actions taken, and outcomes.

53
New cards

Incident Report

A formal report that describes the details of a security incident, its impact, and the steps taken to resolve it.

54
New cards

Incident Response

The process of detecting, responding to, and recovering from security incidents to minimize damage and restore normal operations.

55
New cards

Internet of Things (IoT)

A network of physical devices, vehicles, and appliances that are connected to the internet and can collect and exchange data.

56
New cards

Kensington Lock

A security device that attaches to laptops or other devices to prevent theft by locking them to a fixed object.

57
New cards

Kensington Security Slot

A small slot on many devices where a Kensington lock can be attached.

58
New cards

Key Fob

A small, portable device used for authentication, often in conjunction with a physical keyless entry system.

59
New cards

Keylogger

A type of malicious software that records keystrokes on a computer, often used to steal sensitive information.

60
New cards

License

Legal permission to use software under certain conditions.

61
New cards

Low-Level Format

A process of preparing a storage device by dividing it into sectors and tracks, essentially resetting the disk.

62
New cards

Magnetometer

A device used to detect magnetic fields, which can be used to detect the presence of data on magnetic storage devices.

63
New cards

Malicious Software (Malware)

Software designed to damage, disrupt, or gain unauthorized access to computer systems or networks.

64
New cards

Malware

A broad term for malicious software such as viruses, worms, ransomware, and spyware.

65
New cards

Malware Definition

A set of known malware signatures used by antivirus software to detect malicious programs.

66
New cards

Malware Encyclopedia

A comprehensive database or reference of known malware types and their behaviors.

67
New cards

Malware Signature

A unique identifier or pattern used to detect a specific piece of malware.

68
New cards

Man-in-the-Middle Attack

An attack where the attacker secretly intercepts and potentially alters communication between two parties.

69
New cards

Mantrap

A physical security system that prevents unauthorized access by requiring an individual to pass through two doors or gates, with one locked at all times.

70
New cards

Microsoft Defender Antivirus

A built-in antivirus program for Windows operating systems that provides real-time protection against malware.

71
New cards

Motion Sensor

A device used to detect movement in an area, often used as part of an alarm or security system.

72
New cards

Multifactor Authentication

A security process that requires two or more forms of authentication (something you know, something you have, or something you are) to gain access.

73
New cards

Multimedia Shredder

A tool used to securely delete multimedia files from a system, preventing them from being recovered.

74
New cards

Mutual Authentication

A security process where both parties in a communication verify each other's identity.

75
New cards

Noncompliant System

A system that does not meet the required security standards or regulations.

76
New cards

On-Path Attack

A type of attack where the attacker is in the communication path between two parties, potentially intercepting or altering messages.

77
New cards

Open-source License

A license that allows users to view, modify, and distribute software's source code freely.

78
New cards

Open-source Software

Software whose source code is made publicly available, allowing anyone to inspect, modify, and distribute it.

79
New cards

Payment Card Industry (PCI)

The industry standard for securing payment card transactions, including the PCI DSS (Data Security Standard).

80
New cards

Personal Use License

A software license that allows the software to be used by an individual for personal, non-commercial purposes.

81
New cards

Protected Health Information (PHI)

Sensitive medical data that is protected by laws, such as HIPAA, to ensure privacy.

82
New cards

Phishing

A type of cyber attack where attackers impersonate legitimate entities to steal personal information, usually through deceptive emails or websites.

83
New cards

PII (Personally Identifiable Information)

Any information that can be used to identify an individual, such as name, address, phone number, or Social Security number.

84
New cards

Port Lock

A physical security device used to secure a computer's ports, preventing unauthorized access.

85
New cards

Principle of Least Privilege

A security principle that suggests users should have the minimum level of access necessary to perform their job functions.

86
New cards

87
New cards

Privacy Screen

A screen filter that prevents others from viewing the contents of a screen from an angle.

88
New cards

Quarantined Computer

A computer that has been isolated from the network because it is suspected of being infected with malware.

89
New cards

Rainbow Table

A precomputed table used to quickly look up hash values of passwords for cracking attempts.

90
New cards

Ransomware

A type of malware that encrypts files or locks systems, demanding payment for restoration of access.

91
New cards

Regulated Data

Data that is subject to legal or regulatory controls, such as financial data, health information, or personal identification details.

92
New cards

Regulatory Policies

Guidelines or rules that govern how organizations must handle data, security, and compliance with laws.

93
New cards

Compliance Policies

Organizational policies that ensure adherence to legal, industry, and regulatory standards.

94
New cards

Root Certificate

The highest-level certificate in a certificate chain used to verify the authenticity of a digital certificate.

95
New cards

Rootkit

Malicious software designed to hide the existence of certain processes or programs to gain unauthorized access to a system.

96
New cards

Screensaver Lock

A security feature that locks a computer when the screensaver is activated after a certain period of inactivity.

97
New cards

Security Awareness Training

Training programs that educate employees about security risks and how to mitigate them.

98
New cards

Security Fence

A physical or virtual barrier used to secure a facility, network, or system.

99
New cards

Server Lock

A physical security device used to prevent unauthorized access to a server or data center.

100
New cards

Short Message Service (SMS)

A text messaging service that allows users to send short messages, typically up to 160 characters, between mobile devices.