Cybersecurity Overview

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

flashcard set

Earn XP

Description and Tags

A collection of key terms and definitions related to cybersecurity, its concepts, types of attacks, and protective measures.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Cybersecurity

The organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace-enabled systems from occurrences that misalign de jure from de facto property rights.

2
New cards

Cybersecurity Services

Products, goods, or services used to detect or prevent unauthorized access to, manipulation of, or impairment to information systems.

3
New cards

Man-in-the-Middle Attack

An attack where an attacker places oneself in between two parties' communication to obtain sensitive information without their knowledge.

4
New cards

Ransomware

A form of malware that holds a victim's computer systems hostage until a ransom is paid.

5
New cards

Social Engineering

The manipulation of individuals into revealing confidential information by exploiting human psychology.

6
New cards

Malicious Software

Software designed to infiltrate, harm, or exploit computer systems, including types like ransomware and crimeware.

7
New cards

Network-Based Intrusions

Unauthorized access to a computer network that occurs without predefined permissions.

8
New cards

Wireless Attacks

Cyber attacks that exploit vulnerabilities in wireless networks, often due to lack of security.

9
New cards

Crimeware

Malware specifically designed to automate cybercriminal activities, often for identity theft.

10
New cards

Espionage

The act of obtaining unauthorized classified or secret information for personal, political, or military advantage.

11
New cards

Intellectual Property Theft

Stealing copyrights, trade secrets, and patents using the internet.

12
New cards

Phishing

A form of social engineering where attackers impersonate legitimate entities to trick victims into providing sensitive information.

13
New cards

Rogue Access Points

Unauthorized wireless access points installed on a network without the administrator's knowledge.