5.1 & 5.2 CyberSecurity

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:38 AM on 1/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

24 Terms

1
New cards

Identification methods

techniques and processes used to identify Vulnerabilities, threats, and potential risks within a system or network

2
New cards

Vulnerability scans

automated scans of systems or networks to identify known vulnerabilities

3
New cards

Application security

entails ensuring the security of software applications through various methods

4
New cards

Static analysis

analyzing the source code or binary code of an application without executing it, helps identify potential security issues during the development phase

5
New cards

Dynamic analysis

assessing the application’s behavior during runtime

6
New cards

Package monitoring

monitoring software packages and dependencies for security vulnerabilities, involves tracking and updating packages to ensure that known vulnerabilities are addressed promptly

7
New cards

Open Source Intelligence (OSINT)

gathering information from publicly available sources to understand potential threats or vulnerabilities, includes analyzing data from websites, social media, and other public repositories, goal is to gather relevant and actionable information without relying on classified or confidential sources and to understand the digital footprint of the target

8
New cards

Proprietary/Third Party

leveraging intelligence from private or third party sources such as commercial threat intelligence services to enhance security measures

9
New cards

Information Sharing Organization

participating in information sharing organizations where member entities share threat intelligence and security related information to collectively strengthen defenses

10
New cards

Dark Web

monitoring activities on the dark web, where cybercriminals may exchange information, tools, or compromised data helps identify potential threats

11
New cards

Penetration testing

involves conducting controlled, simulated attacks on systems, networks, or applications to identify Vulnerabilities and weaknesses

12
New cards

Responsible disclosure program

entails establishing a process for security researchers or individuals to responsibly report discovered vulnerabilities to the organization, allowing the organization to address and fix the issues before they can be exploited maliciously

13
New cards

Bug bounty programs

encourage ethical hacking to improve security

14
New cards

System/process audit

conduct a systematic examination and evaluation of an organization’s systems, process,es or controls to ensure compliance, security, and effectiveness

15
New cards

Physical penetration testing

involves assessing the security of physical infrastructure, such as buildings, facilities, and data centers

16
New cards

Offensive penetration testing

an approach where testers adopt the mindset and techniques of real world attackers to identify Vulnerabilities and weaknesses in a system

17
New cards

Defensive penetration testing

focuses on evaluating the effectiveness of an organization’s defensive measures, such as firewalls, intrusion detection systems, and security policies.

18
New cards

Integrated penetration testing

combines various techniques, tools, and approaches to assess both technical and non-technical aspects of security, provides a comprehensive evaluation of an organization’s security posture

19
New cards

Known environment penetration testing

assumes that the testers have prior knowledge about the target environment, including network architecture, systems, and configurations

20
New cards

Partially known environments

testers have some information about the target but not a complete understanding, simulates a scenario where attackers have partial knowledge about the target

21
New cards

Unknown environment penetration testing

involves assessing a system or network where the testers have minimal or no prior information, simulates a scenario where attackers have to discover the environment from scratch

22
New cards

Reconnaissance

the phase in penetration testing where information about the target system or network is gathered

23
New cards

Passive reconnaissance

involves collecting information about the target without directly interacting with it, include gather data from public sources, social media, or public records

24
New cards

Active reconnaissance

involves directly interacting with the target system or network to gather information, includes network scanning, probing, or interacting with system services to discover vulnerabilities