Cybersecurity

0.0(0)
Studied by 3 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:10 AM on 2/8/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

40 Terms

1
New cards

Security Baseline

Standard security settings for an organization.

2
New cards

Group Policy Objects (GPOs)

Windows tool for managing security settings across a domain.

3
New cards

Patch Management

Process of applying security updates to operating systems and applications.

4
New cards

System Hardening

Strengthening security by removing unnecessary components and tightening security settings.

5
New cards

Attack Surface

The sum of all potential vulnerabilities in a system.

6
New cards

Least Privilege Access

Restricting user permissions to the minimum required.

7
New cards

Windows Update

Built-in Windows tool for managing patches.

8
New cards

apt-get

Linux command-line tool for managing software packages.

9
New cards

Malware

Software designed to disrupt confidentiality, integrity, and availability of systems.

10
New cards

Viruses

Malware that spreads through human action, often via email attachments or removable media.

11
New cards

Worms

Self-replicating malware that spreads autonomously across networks.

12
New cards

Trojan Horses

Malware disguised as legitimate software.

13
New cards

Spyware

Malware that acquires user information without consent.

14
New cards

Antivirus Software

Software designed to detect and protect against malware.

15
New cards

Signature Detection

Scans for known malware patterns.

16
New cards

Heuristic/Behavioral Detection

Identifies deviations from normal activity to detect malware.

17
New cards

Endpoint Detection & Response (EDR)

Monitors endpoints for anomalies and triggers automated responses.

18
New cards

Extended Detection & Response (XDR)

Aggregates data from multiple sources to enhance threat detection.

19
New cards

Sandboxing

Testing suspicious executables in an isolated environment.

20
New cards

Windows Defender

Built-in anti-malware tool for Windows OS.

21
New cards

Security Information & Event Management (SIEM)

Centralized system for analyzing and reporting on security data.

22
New cards

Application Control

Restricts software execution to maintain security policy compliance.

23
New cards

Allow Lists

Lists of approved applications that can run on a system.

24
New cards

Deny Lists

Lists of blocked applications that cannot run on a system.

25
New cards

Windows AppLocker

Tool for enforcing application control policies.

26
New cards

Firewalls

Security systems that monitor and control incoming and outgoing network traffic.

27
New cards

Intrusion Detection System (IDS)

Detects suspicious network activity and alerts administrators.

28
New cards

Intrusion Prevention System (IPS)

Detects and actively blocks threats in network traffic.

29
New cards

File Integrity Monitoring (FIM)

A security control that detects unauthorized changes to files.

30
New cards

Data Loss Prevention (DLP)

Technology designed to protect sensitive data from unauthorized disclosure.

31
New cards

Encryption

Process of converting readable data into an unreadable format using algorithms.

32
New cards

Decryption

The process of reverting encrypted data to its original readable form.

33
New cards

Full-Disk Encryption (FDE)

Encrypts the entire contents of a hard drive.

34
New cards

Secure Boot

A UEFI feature that checks the integrity of the boot loader.

35
New cards

Mobile Device Management (MDM)

Technology to manage and secure mobile devices across an organization.

36
New cards

BYOD (Bring Your Own Device)

Policy allowing employees to bring personal devices for work purposes.

37
New cards

Change Management

Standardized process for managing changes in IT systems.

38
New cards

Configuration Management

Process of tracking system settings and changes.

39
New cards

Data Sanitization

Techniques to ensure sensitive data cannot be recovered after disposal.

40
New cards

Geolocation & Geofencing

GPS technology used for tracking devices and creating virtual boundaries.