ISC2 Certified in Cybersecurity (CC)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/167

flashcard set

Earn XP

Description and Tags

by iKen-Z on quilzet. ISC2 Certified in Cybersecurity (CC) glossary.

Last updated 2:54 AM on 3/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

168 Terms

1
New cards

Adequate Security

Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information.

2
New cards

Administrative Controls

Controls implemented through policy and procedures. Examples include access control processes and requiring multiple personnel to conduct a specific operation.

3
New cards

Adverse Events

Events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page or execution of malicious code that destroys data.

4
New cards

Application Programming Interface (API)

A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool.

5
New cards

Application Server

A computer responsible for hosting applications to user workstations.

6
New cards

Artificial Intelligence

The ability of computers and robots to simulate human intelligence and behavior.

7
New cards

Asset

Anything of value that is owned by an organization. Assets include both tangible items such as information systems and physical property and intangible assets such as intellectual property.

8
New cards

Asymmetric Encryption

An algorithm that uses one key to encrypt and a different key to decrypt the input plaintext.

9
New cards

Audit

Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures.

10
New cards

Authentication

Access control process validating that the identity being claimed by a user or entity is known to the system, by comparing one or more factors of identification (SFA or MFA).

11
New cards

Authorization

The right or a permission that is granted to a system entity to access a system resource.

12
New cards

Availability

Ensuring timely and reliable access to and use of information by authorized users.

13
New cards

Baseline

A documented, lowest level of security configuration allowed by a standard or organization.

14
New cards

Biometric

Biological characteristics of an individual, such as a fingerprint, hand geometry, voice, or iris patterns.

15
New cards

Bit

The most essential representation of data (zero or one) at Layer 1 of the OSI model.

16
New cards

Bot

Malicious code that acts like a remotely controlled "robot" for an attacker, with other Trojan and worm capabilities.

17
New cards

Breach

The loss of control, compromise, unauthorized disclosure, or unauthorized acquisition where a person other than an authorized user accesses personally identifiable information.

18
New cards

Broadcast

A one-to-many (one-to-everyone) form of sending internet traffic.

19
New cards

Business Continuity (BC)

Actions, processes and tools for ensuring an organization can continue critical operations during a contingency.

20
New cards

Business Continuity Plan (BCP)

The documentation of a predetermined set of instructions or procedures that describe how an organization's mission/business processes will be sustained during and after a significant disruption.

21
New cards

Business Impact Analysis (BIA)

An analysis of an information system's requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption.

22
New cards

Byte

A unit of digital information that most commonly consists of eight bits.

23
New cards

Checksum

A digit representing the sum of the correct digits in a piece of stored or transmitted digital data, against which later comparisons can be made to detect errors in the data.

24
New cards

Ciphertext

The altered form of a plaintext message so it is unreadable for anyone except the intended recipients.

25
New cards

Classification

Identifies the degree of harm to the organization that might result if an information asset is divulged to an unauthorized person; focused on maintaining confidentiality based on data sensitivity.

26
New cards

Classified or Sensitive Information

Information that has been determined to require protection against unauthorized disclosure and is marked to indicate its classified status and classification level.

27
New cards

Cloud Computing

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort.

28
New cards

Community Cloud

Cloud infrastructure provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance).

29
New cards

Confidentiality

The characteristic of data or information when it is not made available or disclosed to unauthorized persons or processes.

30
New cards

Configuration Management

A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated.

31
New cards

Crime Prevention through Environmental Design (CPTED)

An architectural approach to the design of buildings and spaces that emphasizes passive features to reduce the likelihood of criminal activity.

32
New cards

Criticality

A measure of the degree to which an organization depends on the information or information system for the success of a mission or business function.

33
New cards

Cryptanalyst

One who performs cryptanalysis — the study of mathematical techniques for attempting to defeat cryptographic techniques and/or information systems security.

34
New cards

Cryptography

The study or applications of methods to secure or protect the meaning and content of messages, files, or other information, usually by disguise, obscuration, or other transformations.

35
New cards

Data Integrity

The property that data has not been altered in an unauthorized manner. Covers data in storage, during processing and while in transit.

36
New cards

Data Loss Prevention (DLP)

System capabilities designed to detect and prevent the unauthorized use and transmission of information.

37
New cards

Decryption

The process of converting a ciphertext message back into plaintext through the use of a cryptographic algorithm and the appropriate key.

38
New cards

De-encapsulation

The opposite process of encapsulation, in which bundles of data are unpacked or revealed.

39
New cards

Defense in Depth

Information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization.

40
New cards

Degaussing

A technique of erasing data on disk or tape that, when performed properly, ensures there is insufficient magnetic remanence to reconstruct data.

41
New cards

Denial-of-Service (DoS)

The prevention of authorized access to resources or the delaying of time-critical operations.

42
New cards

Digital Signature

The result of a cryptographic transformation of data which provides the services of origin authentication, data integrity, and signer non-repudiation.

43
New cards

Disaster Recovery (DR)

The activities necessary to restore IT and communications services to an organization during and after an outage, disruption or disturbance of any kind or scale.

44
New cards

Disaster Recovery Plan (DRP)

The processes, policies and procedures related to preparing for recovery or continuation of an organization's critical business functions, technology infrastructure, systems and applications after a disaster.

45
New cards

Discretionary Access Control (DAC)

A certain amount of access control is left to the discretion of the object's owner, who can determine who should have access rights to an object and what those rights should be.

46
New cards

Domain Name Service (DNS)

Can be applied to three interrelated elements: a service, a physical server and a network protocol.

47
New cards

Egress Monitoring

Monitoring of outgoing network traffic.

48
New cards

Encapsulation

Enforcement of data hiding and code hiding during all phases of software development and operational use. Bundling together data and methods.

49
New cards

Encrypt

To protect private information by putting it into a form that can only be read by people who have permission to do so.

50
New cards

Encryption

The process and act of converting a message from its plaintext to ciphertext.

51
New cards

Encryption System

The total set of algorithms, processes, hardware, software and procedures that together provide an encryption and decryption capability.

52
New cards

Event

Any observable occurrence in a network or system.

53
New cards

Exploit

A particular attack that exploits system vulnerabilities.

54
New cards

File Transfer Protocol (FTP)

The internet protocol (and program) used to transfer files between hosts.

55
New cards

Firewalls

Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules.

56
New cards

Fragment Attack

An attack where an attacker fragments traffic in such a way that a system is unable to put data packets back together.

57
New cards

General Data Protection Regulation (GDPR)

EU legislation passed in 2016 that addresses personal privacy, deeming it an individual human right.

58
New cards

Governance

The process of how an organization is managed; includes all aspects of how decisions are made, such as policies, roles and procedures.

59
New cards

Hardening

The process of applying secure configurations to reduce the attack surface and locking down hardware, communications systems, and software based on industry guidelines and benchmarks.

60
New cards

Hardware

The physical parts of a computer and related devices.

61
New cards

Hash Function

An algorithm that computes a numerical value on a data file or electronic message that represents that file or message — like a fingerprint of the file.

62
New cards

Hashing

The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data.

63
New cards

Health Insurance Portability and Accountability Act (HIPAA)

U.S. federal law (est. 1996) that directs the adoption of national standards for electronic healthcare transactions while protecting the privacy of individual's health information.

64
New cards

Hybrid Cloud

A combination of public cloud storage and private cloud storage where some critical data resides in the enterprise's private cloud while other data is stored in a public cloud.

65
New cards

Impact

The magnitude of harm that could be caused by a threat's exercise of a vulnerability.

66
New cards

Incident

An event that actually or potentially jeopardizes the confidentiality, integrity or availability of an information system or the information the system processes, stores or transmits.

67
New cards

Incident Handling

The mitigation of violations of security policies and recommended practices. Also known as Incident Response.

68
New cards

Incident Response (IR)

The mitigation of violations of security policies and recommended practices. Also known as Incident Handling.

69
New cards

Incident Response Plan (IRP)

The documentation of a predetermined set of instructions or procedures to detect, respond to and limit consequences of a malicious cyberattack against an organization's information systems.

70
New cards

Information Security Risk

The potential adverse impacts to an organization's operations, assets, and individuals which results from the possibility of unauthorized access, use, disclosure, disruption, modification or destruction of information and/or information systems.

71
New cards

Infrastructure as a Service (IaaS)

The provider of the core computing, storage and network hardware and software that is the foundation upon which organizations can build and deploy applications.

72
New cards

Ingress Monitoring

Monitoring of incoming network traffic.

73
New cards

Insider Threat

An entity with authorized access that has the potential to harm an information system through destruction, disclosure, modification of data, and/or denial of service.

74
New cards

Institute of Electrical and Electronics Engineers (IEEE)

A professional organization that sets standards for telecommunications, computer engineering and similar disciplines.

75
New cards

Integrity

The property of information whereby it is recorded, used and maintained in a way that ensures its completeness, accuracy, internal consistency and usefulness for a stated purpose.

76
New cards

International Organization of Standards (ISO)

Develops voluntary international standards in collaboration with IEC and ITU, particularly in the field of information and communication technologies.

77
New cards

Internet Control Message Protocol (ICMP)

An IP network protocol used to determine if a particular service or host is available.

78
New cards

Internet Engineering Task Force (IETF)

The internet standards organization that defines protocol standards (e.g., IP, TCP, DNS) through a process of collaboration and consensus.

79
New cards

Internet Protocol (IPv4)

Standard protocol for transmission of data from source to destinations in packet-switched communications networks.

80
New cards

Intrusion

A security event in which an intruder gains, or attempts to gain, access to a system or system resource without authorization.

81
New cards

iOS

An operating system manufactured by Apple Inc. Used for mobile devices.

82
New cards

Layered Defense

The use of multiple controls arranged in series to provide several consecutive controls to protect an asset; also called defense in depth.

83
New cards

Likelihood

The probability that a potential vulnerability may be exercised within the construct of the associated threat environment.

84
New cards

Likelihood of Occurrence

A weighted factor based on a subjective analysis of the probability that a given threat is capable of exploiting a given vulnerability or set of vulnerabilities.

85
New cards

Linux

An operating system that is open source, making its source code legally available to end users.

86
New cards

Log Anomaly

A system irregularity identified when studying log entries which could represent events of interest for further surveillance.

87
New cards

Logging

Collecting and storing user activities in a log, which is a record of the events occurring within an organization's systems and networks.

88
New cards

Logical Access Control Systems

An automated system that controls an individual's ability to access one or more computer system resources, requiring validation of an individual's identity through a PIN, card, biometric or other token.

89
New cards

Man-in-the-Middle

An attack where the adversary positions himself between the user and the system so that he can intercept and alter data traveling between them.

90
New cards

Mandatory Access Control (MAC)

Access control that requires the system itself to manage access controls in accordance with the organization's security policies.

91
New cards

Mantrap

An entrance to a building or an area that requires people to pass through two doors with only one door opened at a time.

92
New cards

Message Digest

A digital signature that uniquely identifies data; changing a single bit in the data will cause a completely different message digest to be generated.

93
New cards

Microsegmentation

Part of a zero-trust strategy that breaks LANs into very small, highly localized zones using firewalls or similar technologies.

94
New cards

Multi-Factor Authentication (MFA)

Using two or more distinct instances of the three factors of authentication (something you know, something you have, something you are) for identity verification.

95
New cards

National Institutes of Standards and Technology (NIST)

Part of the U.S. Department of Commerce; sets standards in a number of areas including information security.

96
New cards

Non-repudiation

The inability to deny taking an action such as creating information, approving information and sending or receiving a message.

97
New cards

Object

Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information.

98
New cards

Operating System

The software "master control application" that runs the computer. The first program loaded when the computer is turned on; its main component, the kernel, resides in memory at all times.

99
New cards

Oversized Packet Attack

Purposely sending a network packet that is larger than expected or larger than can be handled by the receiving system, causing the receiving system to fail unexpectedly.

100
New cards

Packet

Representation of data at Layer 3 of the OSI model.

Explore top notes

note
Richard III
Updated 1239d ago
0.0(0)
note
Group 16 elements
Updated 1346d ago
0.0(0)
note
Ethics in Health Care
Updated 1197d ago
0.0(0)
note
Political History
Updated 1198d ago
0.0(0)
note
Developmental Psych Chapter 19
Updated 1284d ago
0.0(0)
note
Untitled Flashcards Set
Updated 466d ago
0.0(0)
note
Verben Conjugations
Updated 415d ago
0.0(0)
note
Richard III
Updated 1239d ago
0.0(0)
note
Group 16 elements
Updated 1346d ago
0.0(0)
note
Ethics in Health Care
Updated 1197d ago
0.0(0)
note
Political History
Updated 1198d ago
0.0(0)
note
Developmental Psych Chapter 19
Updated 1284d ago
0.0(0)
note
Untitled Flashcards Set
Updated 466d ago
0.0(0)
note
Verben Conjugations
Updated 415d ago
0.0(0)

Explore top flashcards

flashcards
poznávačka rostliny
95
Updated 421d ago
0.0(0)
flashcards
ANTHC101 EXAM #1
97
Updated 386d ago
0.0(0)
flashcards
El bienestar
52
Updated 1168d ago
0.0(0)
flashcards
IST Summitive Ms Yunus 9th
25
Updated 189d ago
0.0(0)
flashcards
Autoteile Vokabeln
43
Updated 1037d ago
0.0(0)
flashcards
AP Lang Rhetorical Devices
80
Updated 482d ago
0.0(0)
flashcards
Unit 8: The New South
20
Updated 46d ago
0.0(0)
flashcards
poznávačka rostliny
95
Updated 421d ago
0.0(0)
flashcards
ANTHC101 EXAM #1
97
Updated 386d ago
0.0(0)
flashcards
El bienestar
52
Updated 1168d ago
0.0(0)
flashcards
IST Summitive Ms Yunus 9th
25
Updated 189d ago
0.0(0)
flashcards
Autoteile Vokabeln
43
Updated 1037d ago
0.0(0)
flashcards
AP Lang Rhetorical Devices
80
Updated 482d ago
0.0(0)
flashcards
Unit 8: The New South
20
Updated 46d ago
0.0(0)