Section 2: Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/180

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:53 PM on 4/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

181 Terms

1
New cards

CIA Triad

A fundamental model in information security that describes the three core principles used to protect data and systems

CIA stands for:
1. Confidentiality
2. Integrity
3. Availability

2
New cards

Vulnerability

Flaw or weakness within a system that can be exploited

3
New cards

Non-compliant System

System that is not on the baseline of what is approved by the organization

4
New cards

Zero-day Vulnerability

Vulnerability that is discovered or exploited before the vendor can issue a patch to fix it

5
New cards

Denial of Service (DoS)

Used to describe an attack that attempts to make a computer or servers’s resources unavailable

6
New cards

Distributed Denial of Service (DDoS)

Uses lots of machines to attack a server to create a DoS (Denial of Service)

7
New cards

Blackhole/Sinkhole

Identifies attacking IP addresses and routes them to a non-existent server through the null interface

8
New cards

IP Spoofing

Modifies the source address of an IP packet to hide the identity of the sender or impersonate another client

9
New cards

Mac Spoofing

Changing the MAC address to pretend the use of a different network interface card or device

10
New cards

On-Path Attack

Attacker is able to put their workstation logically between two hosts during the communication

11
New cards

Replay Attack

Occurs when valid data is captured by the attacker and is then repeated immediately, or delayed, and then repeated

12
New cards

Relay Attack

Occurs when the attacker inserts themself in between the two hosts

13
New cards

SQL Injection

Attack consisting of the insertion or injection of an SQL query via input data from the client to a web application

14
New cards

Injection Attack

Attackers insert malicious input into an application, causing it to execute unintended commands or expose data

15
New cards

Cross-Site Scripting (XSS)

A web security vulnerability that lets attackers inject malicious scripts into trusted websites, which then run in unsuspecting users' browsers, allowing attackers to steal data, impersonate users, or deface websites

16
New cards

Cross-Site Request Forgery (XSRF/CSRF)

Occurs when an attacker forces a user to execute actions on a web server for which they are already authenticated

17
New cards

Password Cracker

Uses comparative analysis to break passwords and systematically continues guessing until the password is determined

18
New cards

Dictionary Attack

Method where a program attempts to guess the password by using a list of possible passwords

19
New cards

Brute-Force Attack

Method where a program attempts to try every possible combination until it cracks the password

20
New cards

Cryptanalysis Attack

An attempt to break or bypass a cryptographic system in order to gain access to encrypted information without knowing the secret key

21
New cards

Insider Threat

An employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company

22
New cards

Supply Chain Attack

Attack that involves targeting a weaker link in the supply chain to gain access to a primary target

23
New cards

Chip Washing

Involves repacking the contents of a microchip with a less expensive one or embedded malware

24
New cards

4 ways to prevent supply chain attack

Vender Due Diligence
Regular Monitoring and Audits

Education and Collaboration

Incorporating Contractual Safeguards

25
New cards

Vendor Due Diligence

Organizations must perform due diligence when onboarding vendors with critical access

26
New cards

Regular Monitoring and Audits

Security practices used to continuously observe systems and periodically review them to ensure they are operating properly and securely

27
New cards

Education and Collaboration

Informing the ecosystem about threats, vulnerabilities, and best practices ensures industry protection

28
New cards

Incorporating Contractual Safeguards

Legal agreements or clauses that define how access, data, and systems must be handled

29
New cards

Virus

Malicious code that runs on a machine without user knowledge and infects the computer when executed

30
New cards

Boot Sector Virus

A type of malware that infects the Master Boot Record (MBR) of hard drives or the boot sector of removable media like USB drives, loading before the operating system to gain control and disrupt the system startup process

31
New cards

Macros

Code that embed a virus in a document, executing it when the document is opened

32
New cards

Program Virus

Seeks out executable or application to infect

33
New cards

Multipartite Virus

Combination of a boot sector type virus and a program virus

34
New cards

Encrypted Virus

A type of malware that encrypts its own code to hide from antivirus detection

35
New cards

Polymorphic Virus

Changes its code with each execution by altering the decryption module to evade detection

36
New cards

Stealth Virus

Uses various techniques to evade antivirus detection

37
New cards

Armored Virus

A specialized form of virus that has a protective layer to confuse programs or individuals analyzing it

38
New cards

Hoax

Not a traditional virus but tricks users into infecting their own machines

39
New cards

Worm

A malicious software like a virus but replicates itself without user interaction

40
New cards

Trojan

A piece of malicious software that is disguised as a piece of harmless or desirable software

41
New cards

Fileless Malware

Used to create a process in the system memory without replying on the local file system of the infected host

42
New cards

Spyware

Malicious software designed to monitor activities and gather information without consent

43
New cards

Keyloggers

Record every keystroke to capture sensitive information like usernames, passwords, and credit card numbers, sending it to the attacker

44
New cards

Stalkerware

Invasive spyware often installed by someone with access to the victim’s device to monitor activity without knowledge or consent

45
New cards

Adware

Type of spyware that serves targeted ads by tracking online activity, including browsing history and search queries

46
New cards

Potentially Unwanted Programs (PUPs)

Software applications unintentionally installed, often bundled with other software

47
New cards

Rootkit

Software designed to gain administrative level control over a system without detection

48
New cards

DLL Injection

Inserts malicious code into a running process on a Windows machine by exploiting DLLs loaded at runtime

49
New cards

Driver Manipulation

An attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level

50
New cards

Botnet

A network of compromised, internet-connected devices infected with malware and controlled by a "bot-herder" to perform malicious tasks

51
New cards

Malware

Any program designed to disrupt, damage, or gain unauthorized access to computer systems, networks, and personal data

52
New cards

Endpoint Detection and Response (EDR)

A security solution that continuously monitors devices to detect, investigate, and respond to cyber threats in real time

53
New cards

Managed Detection and Response (MDR)

A service where a third-party provider monitors an organization’s environment for threats and responds to incidents

54
New cards

Extended Detection and Response (XDR)

Expands on Endpoint Detection and Response by integrating security data from endpoints, networks, servers, and email systems into a unified platform

55
New cards

Recovery Console

A diagnostic environment for troubleshooting and recovering from system issues, including malware infections

56
New cards

Operating System Reinstallation

The system is formatted, wiped, reinstalled from a known good source, and user data is restored from a known good backup

57
New cards

Antivirus Software

Scans files, applications, and systems for known threat signatures, providing real-time protection and periodic scans

58
New cards

Anti-malware

Complements antivirus tools by detecting and removing various threats, including spyware, adware, and fileless malware

59
New cards

Email Security Gateways

Filter email traffic to block malicious content, including phishing and malware attachments

60
New cards

Software Firewalls

Monitor and control incoming and outgoing network traffic based on predefined security rules

61
New cards

User Education

One of the most effective methods for reducing malware incidents

62
New cards

Phising

A social engineering attack where malicious actors impersonate entities to steal confidential information

63
New cards

Spear Phising

More targeted form of phishing in which emails are sent to a more specific group of individuals

64
New cards

Whaling

A type of phishing attack that specifically targets high-level executives or important individuals in an organization, such as CEOs, CFOs, or directors

65
New cards

Smishing

Short for SMS phishing, targets users through text messages

66
New cards

Vishing

Short for voice phishing, involves attackers using phone calls to deceive victims

67
New cards

Business Email Compromise (BEC)

A sophisticated email scam where cybercriminals impersonate trusted figures (like CEOs or vendors) to trick employees

68
New cards

QR Code Phishing (Quishing)

Involves attackers distributing malicious QR codes to their victims

69
New cards

Spam

Abuse of electronic messaging systems such as email, texting, social media, broadcast media, and instant messaging

70
New cards

Open Mail Relay

A vulnerability occurs when a mail server is improperly configured, allowing anyone on the internet to send emails through it without authentication

71
New cards

Impersonation

Actor pretending to be someone or something else, such as during a physical penetration test to gain access to a facility

72
New cards

Elicitation

The ability to draw, bring forth, evoke, or induce information from a victim

73
New cards

Social Engineering

Attempt to manipulate users into revealing confidential information or performing actions detrimental to security

74
New cards

Tailgating

Occurs when an attacker follows an authorized person into a secure area without their knowledge or consent

75
New cards

Piggybacking

Similar to tailgating but occurs with the employee’s knowledge or consent

76
New cards

Shoulder Surfing

Occurs when an attacker uses direct observation to obtain authentication information by approaching an employee from behind

77
New cards

Eavesdropping

Involves using listening to gather information, such as overhearing a conversation

78
New cards

Dumpster Diving

Occurs when an attacker scavenges for personal or confidential information in garbage or recycling containers

79
New cards

Evil Twin

A fraudulent Wi-Fi access point that appears legitimate but is set up to eavesdrop on wireless communications

80
New cards

KARMA Attack

A type of wireless network attack where a malicious device pretends to be any Wi-Fi network a victim’s device is trying to connect to

81
New cards

Personal Firewall

Software that protects a single computer or server from unwanted internet traffic

82
New cards

Host-based Firewall

A security system that runs directly on a single device and controls what network traffic is allowed in and out of that machine

83
New cards

iptables

A command-line user-space utility in Linux that configures IPv4 packet filtering rules, acting as a firewall by interfacing with the Netfilter kernel modules

84
New cards

85
New cards

86
New cards

Administrative Controls

Manage personnel and assets through policies, standards, procedures, and guidelines

87
New cards

Lockable Rack Cabinet

Controls access to servers, switches, and routers installed in standard networking racks

88
New cards

Kensington Lock

A physical security device used to prevent laptops and other devices from being stolen

89
New cards

Vestibule

Serves as a way to limit the people that go in or out of an organization

90
New cards

Smart Card Reader

Reads an embedded microchip on a badge containing authentication information

91
New cards

Discretionary Access Control (DAC)

Access control method where access is determined by the owner of the resource

92
New cards

Mandatory Access Control (MAC)

A strict security model where access to resources is controlled by a central authority, not be individual users

93
New cards

Role-Based Access Control (RBAC)

A way of managing who can access what in a system by assigning permissions to roles instead of directly to individual users

94
New cards

Zero-Trust

Security framework that requires the users to be authenticated, authorized, and validated

95
New cards

Identification

Access requests require identity verification

96
New cards

Authentication

Identity verification using a unique identifier and approved credentials

97
New cards

Multifactor Authentication (MFA)

Uses two or more factors to prove a user’s identity

98
New cards

In-Band Authentication

A method where authentication data is sent through the same communication channel as the main data or service you are trying to access.

99
New cards

Out-of-Band Authentication

A security method where authentication happens through a separate communication channel from the one being used to access the system

100
New cards

Enterprise Mobility Management (EMM)

Enables centralized management and control of corporate mobile devices