Cybersecurity and Information Technology Key Terms for Students

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Accounting

The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.

2
New cards

Artificial Intelligence

A computer system able to perform tasks that ordinarily require human intelligence.

3
New cards

Authentication

The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.

4
New cards

Authorization

The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.

5
New cards

Availability

The assurance that systems and data are accessible by authorized users when and where needed.

6
New cards

Biometric Authentication

A form of authentication that uses an individual's physical or behavioral characteristics to verify their identity.

7
New cards

Confidentiality

The protection of information from people who are not authorized to view it.

8
New cards

Copyright

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale.

9
New cards

Cyberbullying

The use of electronic communication to bully a person.

10
New cards

Cyberterrorists

Have political motivations with the intent to harm, typically resulting in violence.

11
New cards

Deepfake

A video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.

12
New cards

Digital Footprint

The information about a particular person that exists on the Internet as a result of their online activity.

13
New cards

Ethics

The moral principle that governs a person's behavior.

14
New cards

Firewall

A network security device that monitors and filters incoming and outgoing network traffic.

15
New cards

Hacktivist

A specific group of hackers who are motivated by their ideological views.

16
New cards

Information Literacy

Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

17
New cards

Integrity

Aims at ensuring that information is protected from unauthorized or unintentional alteration.

18
New cards

Internet of Things

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

19
New cards

Law

Refers to an external mechanism of control.

20
New cards

Malware

Any type of software that is designed to intentionally harm or damage a computer or network.

21
New cards

Multifactor Authentication (MFA)

An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).

22
New cards

Nation State Hackers

Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.

23
New cards

Non-Repudiation

Ensures that one cannot deny having sent or received a message.

24
New cards

Passphrase

A type of authentication that is similar to a password but longer and is usually a sentence or a series of words.

25
New cards

Password Manager

Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.

26
New cards

Personally Identifiable Information (PII)

Any data that can be used to identify an individual, such as their name, address, or social security number.

27
New cards

Phishing

A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.

28
New cards

Privacy Policy

Legal document outlining how a company can collect and use your data.

29
New cards

Ransomware

A software that prevents users from accessing their files or network until a ransom is paid.

30
New cards

Risk

The potential for loss when an attack happens.

31
New cards

Spyware

Once downloaded onto a user's computer, the software secretly gathers information about a person or organization and sends it to the attacker.

32
New cards

Threat

A potential for a cybercriminal to exploit a vulnerability.

33
New cards

Two-Factor Authentication (2FA)

A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone).

34
New cards

Virus

A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.

35
New cards

Vulnerability

A flaw or weakness in a system or device.