Cybersecurity Glossary - Course 1

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key cybersecurity terms from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Adversarial artificial intelligence (AI)

A technique that manipulates AI/ML systems to conduct attacks more efficiently.

2
New cards

Antivirus software

Software that prevents, detects, and removes malware and viruses.

3
New cards

Asset

An item perceived as having value to an organization.

4
New cards

Authentication

Verifying who someone is.

5
New cards

Availability

Ensuring data is accessible to authorized users.

6
New cards

Business Email Compromise (BEC)

Phishing attack impersonating a known source to obtain financial gain.

7
New cards

Computer virus

Malicious code designed to interfere with operations and damage data and software.

8
New cards

Confidentiality

Only authorized users can access specific assets or data.

9
New cards

CIA triad

Confidentiality, Integrity, and Availability: a risk-management model for information security.

10
New cards

Cryptographic attack

An attack on cryptographic systems that targets secure communications.

11
New cards

Cybersecurity

The practice of protecting confidentiality, integrity, and availability of information across networks, devices, and users.

12
New cards

Database

An organized collection of information or data.

13
New cards

Data point

A specific piece of information.

14
New cards

Hacker

A person or group that uses computers to gain unauthorized access to data.

15
New cards

Hacktivist

A hacker who aims to achieve political goals.

16
New cards

HIPAA

U.S. federal law protecting patients’ health information.

17
New cards

Integrity

Data being correct, authentic, and reliable.

18
New cards

Internal threat

Current or former employee, external vendor, or trusted partner who poses a security risk.

19
New cards

Intrusion detection system (IDS)

An application that monitors activity and alerts on possible intrusions.

20
New cards

Linux

An open-source operating system.

21
New cards

Log

A record of events in an organization’s systems.

22
New cards

Malware

Software designed to harm devices or networks.

23
New cards

NIST CSF

A voluntary framework of standards, guidelines, and best practices to manage cybersecurity risk.

24
New cards

Network protocol analyzer (packet sniffer)

A tool that captures and analyzes data traffic within a network.

25
New cards

Network security

Practices to keep an organization's network infrastructure secure from unauthorized access.

26
New cards

Open Web Application Security Project (OWASP)

A nonprofit organization focused on improving software security.

27
New cards

Order of volatility

The sequence outlining the order of data that must be preserved from first to last.

28
New cards

Password attack

An attempt to access password-protected devices, systems, networks, or data.

29
New cards

Personally identifiable information (PII)

Any information used to infer an individual’s identity.

30
New cards

Phishing

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

31
New cards

Physical attack

A security incident that affects both digital and physical environments where the incident is deployed.

32
New cards

Physical social engineering

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.

33
New cards

Privacy protection

Safeguarding personal information from unauthorized use.

34
New cards

Programming

The process of writing code to create computer instructions.

35
New cards

Protected health information (PHI)

Health information related to an individual’s physical or mental health.

36
New cards

Protecting and preserving evidence

Handling digital evidence properly to preserve its integrity.

37
New cards

Security architecture

An overall security design with multiple components to protect an organization.

38
New cards

Security controls

Safeguards to reduce specific security risks.

39
New cards

Security ethics

Guidelines for ethical decision-making in security work.

40
New cards

Security frameworks

Guidelines for building risk-mitigating security plans.

41
New cards

Security governance

Practices that guide and direct an organization's security efforts.

42
New cards

Security information and event management (SIEM)

An application that collects and analyzes logs to monitor critical activities.

43
New cards

Sensitive personally identifiable information (SPII)

A strict subset of PII requiring stricter handling guidelines.

44
New cards

Social engineering

Manipulation exploiting human error to gain private information or access.

45
New cards

Social media phishing

Targeted collection of detailed information about a target on social media before an attack.

46
New cards

Spear phishing

A targeted phishing email appearing to come from a trusted source.

47
New cards

SQL (Structured Query Language)

A programming language used to interact with databases.

48
New cards

Supply-chain attack

An attack targeting weaknesses in the supply chain to deploy malware.

49
New cards

Technical skills

Knowledge of tools, procedures, and policies used in security.

50
New cards

Threat

Any circumstance or event that can negatively impact assets.

51
New cards

Threat actor

Any person or group who presents a security risk.

52
New cards

Transferable skills

Skills from other areas applicable to different careers.

53
New cards

USB baiting

Leaving a malware-infected USB stick for an employee to find and use.

54
New cards

Virus

Malicious software that replicates and can spread to other systems.

55
New cards

Vishing

The exploitation of voice calls to obtain sensitive information or impersonate a known source.

56
New cards

Watering hole attack

An attack where a threat actor compromises a website frequently visited by a specific group of users.