204 Chap 10

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/93

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:11 PM on 5/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

94 Terms

1
New cards

Vunerability

An opportunity fir attackers to gain access to individual or organizational assets

2
New cards

Intellectual Property (IP)

Information owned by the company and protected by law

3
New cards

Incidents, breaches, or compromises

A successful attack against a computer system

4
New cards

Threat Environment q

The types of attackers and attacks that companies face

5
New cards

Countermeasures

Software or procedures implemented to stop an attack

6
New cards

Safeguards

Any action, device, procedure, technique, or other measure that reduces a system’s vunerability to a threat

7
New cards

Cybersecurity

The process of protecting computer hardware, networks, data, and applications from attackers

8
New cards

Weakest-link

The failure of even one cybersecurity safeguard may result in a breach

9
New cards

Comprehensive Security

Closing all routes of attack to an organization’s system to attackers

10
New cards

Threats

A person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge

11
New cards

Unauthorized Data Disclosure

Event when data that is supposed to be protected, is released to unauthorized people

12
New cards

Insider Threats

A person who maliciously uses legitimate credentials and confidential information to destroy data or other system components

13
New cards

Fraud

Intentionally deceptive actions taken for an unlawful gain

14
New cards

Cybercrime

The execution of crimes on the internet

15
New cards

Hacking

A form of computer crime in which a person gains unauthorized access to a computer system. Some hackers have malicious intent

16
New cards

Career Criminals

Attackers who attack for purely criminal motives to make money illegally

17
New cards

Hacktivists

Hackers who commit cybercrimes based on political or social beliefs

18
New cards

Dark Web

Web content exists on obscured private networks and requires special software to access

19
New cards

Social Engineering

Attacks that take advantage of flawed human judgement by convincing the victim to take actions that are countered to security policies

20
New cards

Pretexting

Deceiving someone over the internet by pretending to be another person or organization

21
New cards

Phishing

Technique for obtaining unauthorized data the uses pretexting via email

22
New cards

Phisher

An individual or organization that spoofs legitimate companies in an attempt to illegally capture person data

23
New cards

Smishing

Phishing done using SMS messaging (texts)

24
New cards

Vishing

Phishing done over the phone

25
New cards

Spoofing

When someone pretends to be someone else with the intent of obtaining unauthorized data.

26
New cards

IP Spoofing

A type of spoofing whereby an intruder uses another site’s IP address as if it were that other site

27
New cards

Sniffing

Technique for intercepting computer communications. Sometimes requires physical connection to the networks

28
New cards

Wardrivers

People who search an area for unprotected wireless networks using a laptop or smartphone

29
New cards

Packet Sniffers

A program that captures network traffic

30
New cards

Advanced Persistent Threat (APT)

Sophisticated, possibly long-running, computer hack that is perpetrated by large, well-funtioning organizations like governments

31
New cards

Malware

Viruses, worms, trojan horses, spyware, and adware

32
New cards

Cyber Warfare Forces

Specialized military units operated by national governments, integrated into their militaries and focused on cyberwar

33
New cards

Cyberwar

Computer-based attacks made by national governments

34
New cards

Crime-as-a-Service

Cloud-based criminal services that automate many of the labor-intensive functions that cyber criminals have to perform as part of their criminal operations

35
New cards

Ransonware-as-a-Service

A cloud-based criminal service that provides attackers with custom ransomware, software, management consoles, and victim payment portals

36
New cards

Scanning-as-a-Service

A cloud-based criminal service that provides fully automated vulnerability scanning of systems and websites

37
New cards

Spamming-as-a-Service

A cloud-based criminal service that offers bulk sending of customized unwanted messages

38
New cards

Malware Distribution-as-a-Service

A cloud-based criminal service that provides the automated distribution of malware

39
New cards

Phishing-as-a-Service

A cloud-based criminal service that offers fully-automated phishing campaigns

40
New cards

Access-as-a-Service

A cloud-based criminal service that provides unauthorized access to systems

41
New cards

Security Policy

A document that states the rules and procedures that protect an organization’s information systems and data

42
New cards

Information System Fatigue

A reluctance to deal with information security due to feeling overwhelmed

43
New cards

NIST Cybersecurity Framework

A governance framework designed to help organizations better reduce and manage cybersecurity risks

44
New cards

Intrusion Detection System (IDS)

A computer program that senses when another computer is attempting to scan or otherwise access a computer

45
New cards

Response

Recovery from an incident according to plan

46
New cards

Best Practices

Methods to have been shown to produce successful results in prior implementations

47
New cards

Crypto Malware

Malicious software that encrypts your data and prevents you from accessing it until money is paid to the attacker

48
New cards

Passphrase

A password that consists of a sequence of words

49
New cards

Password Cracking

Recovering passwords using automated password guessing software

50
New cards

Brute Force Attack

A password-cracking program that tries every possible combination of characters

51
New cards

Credential Stuffing

The automated injection of stolen usernames and passwords to gain access to multiple web sites

52
New cards

Password Reuse

The use of login information to access multipe sites

53
New cards

Authentication

The process whereby an information system verifies a user

54
New cards

Authorization

Specific permissions that a particular authenticated user should have, given his or her authenticated identity

55
New cards

Web Trackers

Files that collect and store info about users’ web activities

56
New cards

Cookies

A small file that is stored on the user’s computer by a browser. Can be used for authentication, storing shopping cart contents, or to implement spyware

57
New cards

Third-party Cookie

A cookie created by a site other than one visited

58
New cards

Browser Fingerprinting

Collection of unique browser ingo like operating system, screen resolution, device model, and browsing history to create a fingerprint about who you are

59
New cards

Web Beacons

Single-pixel transparent images that are used to track your behaviors

60
New cards

Technical Safeguards

Procedures designed to protect the hardware and software components of an information systemq

61
New cards

Access Control

The policy driven control of access to buildings, systems, data, networks, and data flows

62
New cards

AAA Framework

A framework to control and track access which includes authentication, authorization, and accounting

63
New cards

Identification

The process whereby an information system identifies a user by requiring the user to sign on with a username and password

64
New cards

Supplicant

The person requesting access

65
New cards

Verifier

The person providing admission

66
New cards

Logging

Recording the actions a person takes with a resource and stores them in logs

67
New cards

Logs

Files that store data about events

68
New cards

Two-factor Authentication

Requiring a supplicant to supply two sets of authentication credentials

69
New cards

Multi-factor Authentication

More than two forms of authentication are required

70
New cards

Smart Card

Plastic cards that hold a microchip, which holds much more data than a magnetic strip

71
New cards

Personal Identification Number (PIN)

A form of authentication whereby the user supplies a number that only he or her knows

72
New cards

One-time-password Token

A small device with a display that has a number that changes frequently

73
New cards

Biometric Authentication

The use of person physical characteristics to authenticate users

74
New cards

Encryption

Process of transforming clear text into code

75
New cards

Plaintext

The original message displayed in readable text

76
New cards

Ciphertext

Plaintext that is enciphered into encryption for confidentiality

77
New cards

Key

String of bits used to encrypt data

78
New cards

Cipher

A specific mathematical process used in encryption and decryption

79
New cards

Symmetric Encryption

Encryption method whereby the same key is used to encode and decode the message

80
New cards

Asymmetric Encryption

Encryption method whereby different keys are used to encode and decode the message

81
New cards

Encryption Algorithms

Algorithms used to transform clear text into coded, unintelligible text for secure storage or cimmunication

82
New cards

Advanced Encryption Standard (AES)

Preferred symmetric key encryption standard today

83
New cards

Cryptographic System

A packaged set of cryptographic countermeasures for protecting communication

84
New cards

Public Key Encryption

Popular encryption method for the internet. Each site has a public key for encodeing and a private key for decoding

85
New cards

Hypertext Transfer Protocol Secure or HRRPS

A protocol that ensures secure communication over the Internet

86
New cards

Transport Layer Security

The new name for a later version of Secure Sockets Layer (SSL)

87
New cards

Firewall

Computing device that prevents unauthorized network access

88
New cards

Perimeter Firewall

A firewall that sits outside the organizational network; it is the first device that Internet traffic encounters

89
New cards

Internal Firewalls

Firewalls that sit inside the organizational network

90
New cards

Packet-Filtering Firewall

Firewall that examines each part of a message and determines whether to let that part pass

91
New cards

Man-in-the-Middle Attack (MITM)

A form of attack in which an attacker intercepts messages being sent between two parties and forwards them on

92
New cards

Evil Twin Access Point

A computer that has software to allow it to masquerade as an access point

93
New cards

Wireless Signal Jammer

A device designed to deliberately interfere with wireless communication

94
New cards

Honeypots

False targets for computer criminals to attack