Cybersecurity Fundamentals Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key cybersecurity fundamentals, including core concepts, risk factors, threat classifications, and control types.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Cybersecurity

The protection of the hardware, software, and data assets of a computer system.

2
New cards

Asset

Anything of value that must be protected, including hardware, software/network components, and data.

3
New cards

Hardware (as an asset)

Physical devices such as computers, medical devices, automobiles, industrial controllers, security systems, and household appliances.

4
New cards

Software/Network Assets

Operating systems, applications, access-control mechanisms, network traffic, device identity, and related components.

5
New cards

Data Assets

Files, photos, databases, location information, payment data, access lists, and other stored or transmitted information.

6
New cards

Vulnerability

A weakness in a system that can allow harm to occur.

7
New cards

Threat

A circumstance or event with the potential to cause harm to an asset.

8
New cards

Attack

The exploitation of a vulnerability by a threat actor.

9
New cards

Countermeasure (Control)

An action or device that removes or reduces a vulnerability.

10
New cards

Attack Surface

The complete set of a system’s vulnerabilities that can be exploited.

11
New cards

Confidentiality

Ensuring that only authorized persons or systems can access information.

12
New cards

Integrity

Maintaining accurate, uncorrupted information that is only altered by authorized entities under controlled circumstances.

13
New cards

Availability

Ensuring information and systems are accessible when needed.

14
New cards

Authentication

The process of confirming the identity of a sender or signer.

15
New cards

Nonrepudiation

Assurance that an asserted action or communication cannot later be denied.

16
New cards

C-I-A Triad

The foundational cybersecurity model consisting of Confidentiality, Integrity, and Availability.

17
New cards

Risk

The potential for harm or loss resulting from threats exploiting vulnerabilities, considering likelihood and impact.

18
New cards

Likelihood

The chance that a specific threat will occur.

19
New cards

Impact

The amount of damage that could occur if a threat is realized.

20
New cards

Harm

The negative consequence of an attack, such as theft, privacy loss, destruction, operational disruption, or reputational damage.

21
New cards

Method (in attacks)

The skills and tools an attacker uses to carry out an attack.

22
New cards

Opportunity (in attacks)

The time and access an attacker has to perform an attack.

23
New cards

Motive (in attacks)

The reason an attacker chooses to carry out an attack.

24
New cards

Interception

Unauthorized access to information.

25
New cards

Interruption

An event that makes a system or service unavailable or unusable.

26
New cards

Modification

Unauthorized changes made to data or systems.

27
New cards

Fabrication

Creation of false data or records by an unauthorized party.

28
New cards

Detective Control

A control that identifies when a threat is acting or has acted on a vulnerability (e.g., monitoring, alarms).

29
New cards

Preventive Control

A control that keeps a threat from exploiting a vulnerability (e.g., firewalls, encryption).

30
New cards

Deterrent Control

A control that discourages attacks, often through policies, procedures, or training.

31
New cards

Corrective Control

A control that reduces the impact of an attack, such as backups or disaster recovery systems.

32
New cards

Physical Controls

Tangible protections like locks, security guards, and backup copies of data.

33
New cards

Technical Controls

Software, hardware, or network mechanisms such as passwords, encryption, firewalls, and biometric readers.

34
New cards

Procedural Controls

Policies, procedures, standards, and training aimed at governing human behavior.

35
New cards

Risk Transfer

Shifting risk to another party, such as through insurance or outsourcing.

36
New cards

Nonhuman Threat

Threats arising from natural disasters, hardware failures, and other nonhuman sources.

37
New cards

Human Threat

Threats arising from human actions, whether accidental (spills, mistakes) or intentional (hacking).

38
New cards

Malicious Threat

An intentional act designed to cause harm.

39
New cards

Non-malicious Threat

An accidental or unintentional act that may still cause harm.

40
New cards

Random Threat

A threat that is not specifically directed at a particular target.

41
New cards

Directed Threat

A threat specifically aimed at a particular system or organization.