1/12
A collection of key terms and definitions related to cybersecurity, its concepts, types of attacks, and protective measures.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cybersecurity
The organization and collection of resources, processes, and structures used to protect cyberspace and cyberspace-enabled systems from occurrences that misalign de jure from de facto property rights.
Cybersecurity Services
Products, goods, or services used to detect or prevent unauthorized access to, manipulation of, or impairment to information systems.
Man-in-the-Middle Attack
An attack where an attacker places oneself in between two parties' communication to obtain sensitive information without their knowledge.
Ransomware
A form of malware that holds a victim's computer systems hostage until a ransom is paid.
Social Engineering
The manipulation of individuals into revealing confidential information by exploiting human psychology.
Malicious Software
Software designed to infiltrate, harm, or exploit computer systems, including types like ransomware and crimeware.
Network-Based Intrusions
Unauthorized access to a computer network that occurs without predefined permissions.
Wireless Attacks
Cyber attacks that exploit vulnerabilities in wireless networks, often due to lack of security.
Crimeware
Malware specifically designed to automate cybercriminal activities, often for identity theft.
Espionage
The act of obtaining unauthorized classified or secret information for personal, political, or military advantage.
Intellectual Property Theft
Stealing copyrights, trade secrets, and patents using the internet.
Phishing
A form of social engineering where attackers impersonate legitimate entities to trick victims into providing sensitive information.
Rogue Access Points
Unauthorized wireless access points installed on a network without the administrator's knowledge.