1/175
A comprehensive set of flashcards focusing on key concepts and terms related to digital awareness and cybersecurity.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Cyberspace
The virtual environment in which electronic communication occurs.
Internet
A global network connecting millions of computers worldwide.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic.
Antivirus Software
Software designed to detect and remove malicious software from computer systems.
Phishing
Attempt to deceive individuals into providing sensitive information by posing as a trustworthy entity.
Malware
Malicious software designed to harm, exploit, or otherwise compromise computer systems.
Ransomware
A type of malware that encrypts a user's files and demands payment for decryption.
Zero-Day Attack
An exploit that takes advantage of a computer application vulnerability on the same day that it becomes known.
E- Commerce
Buying and selling of goods and services over the internet.
Online Banking
Internet-based services that allow users to conduct various banking activities.
Digital Wallet
A digital version of a physical wallet that stores payment information for online and in-person transactions.
Two-Factor Authentication (2FA)
An additional layer of security that requires not only a password but also a second form of verification.
Social Engineering
Manipulation of individuals into divulging confidential or personal information.
Cloud Computing
The delivery of computing services over the internet.
Data Breach
A security incident where unauthorized access to protected data occurs.
Identity Theft
Unauthorized acquisition and use of someone else's personal information.
Cyberbullying
Harassing someone through electronic means, often via social media.
Internet of Things (IoT)
The interconnection of physical devices that can collect and exchange data.
Academic Bank of Credit (ABC)
A system where academic credits earned by students are stored and managed centrally.
Digital Literacy
The ability to effectively use digital technology and communication tools.
Encryption
The process of converting information into a code to prevent unauthorized access.
Hashtag
A word or phrase preceded by a hash symbol that categorizes content on social media.
Online Fraud
Various fraudulent schemes conducted over the internet.
Denial of Service (DoS)
An attack intended to make a machine or network resource unavailable to its intended users.
Social Media Platforms
Online services or applications that allow users to create, share, and exchange content.
Data Security
The process of protecting data from unauthorized access and corruption.
Cyber Crime
Criminal activity carried out by means of computers or the internet.
Legal Compliance
Adherence to laws and regulations relevant to business operations.
Incident Response Plan
A predetermined set of instructions to follow when a cyberattack occurs.
Digital Payments
Transaction methods conducted over the internet or through mobile technology.
Advanced Persistent Threat (APT)
A prolonged and targeted cyberattack wherein an attacker gains access to a network and remains undetected.
Victim Support
Assistance provided to individuals affected by cyber crimes.
Secure Socket Layer (SSL)
A standard security technology for establishing an encrypted link between a server and a client.
Online Learning Resources
Educational materials available on the internet for self-paced learning.
National Cyber Security Policy
A government initiative aimed at securing the nation’s cyberspace.
Cyber Ethics
The study of moral, legal, and social issues related to cyberspace.
Digital Footprint
The trail of data you leave behind when you use the internet.
Artificial Intelligence (AI)
Simulation of human intelligence processes by machines.
Machine Learning (ML)
A subset of AI that involves the use of algorithms to parse data, learn from it, and make decisions.
Biometrics
Authentication techniques that rely on measurable physical characteristics of the user.
Privacy Policy
A legal document that explains how customer information is collected, used, and protected.
User Authentication
The process of determining whether someone or something is, in fact, who or what it is declared to be.
Vulnerability Assessment
The process of identifying weaknesses in a system or application.
Social Media Marketing
The use of social media platforms to promote products or services.
e-Government
The use of digital tools and systems to provide public services.
Content Management System (CMS)
Software for creating, managing, and modifying digital content.
Digital Signature
An electronic signature that verifies the authenticity and integrity of a message.
Incident Reporting
The formal process of notifying authorities or managers about security incidents.
Risk Management
The process of identifying, assessing, and controlling threats to an organization's assets.
Public Key Infrastructure (PKI)
A framework for managing digital certificates and public-key encryption.
Data Governance
The overall management of the availability, usability, integrity, and security of data.
Mobile Security
Protecting both personal and enterprise information stored on mobile devices.
Web Application Firewall (WAF)
A security system that monitors and filters HTTP traffic between a web application and the Internet.
Supply Chain Attack
A cyberattack that seeks to damage an organization by targeting less-secure elements in the supply chain.
Online Activism
Using digital tools to promote social, political, or environmental change.
National Investigation Agency (NIA)
An agency in India responsible for combating terrorism in the country.
Internet Protocol (IP)
A set of rules governing the format of data sent over the Internet.
Cybersecurity Framework
A structure that guides organizations in managing and reducing cyber risk.
Backups
Copies of data that are made to recover information in case of loss.
Intellectual Property Rights (IPR)
Legal rights that protect creations and inventions.
Privacy Settings
Controls that allow users to set restrictions on who can see their information or posts.
Digital Thefts
Unauthorized access and theft of digital information or assets.
Secure File Transfer Protocol (SFTP)
A secure version of the file transfer protocol for transferring files over a secure connection.
Compliance Audits
Systematic examinations of an organization’s adherence to regulatory guidelines.
Cloud Deployment Models
Different methods of deploying cloud services including public, private, hybrid, and community clouds.
User Access Levels
Different permissions given to users based on their role in a system.
Encryption Standards
Specifications that outline how encryption will be applied.
Digital Rights Management (DRM)
Technologies used to control access to copyrighted works.
Online Citation
The practice of referencing other digital works in an electronic format.
Cybersecurity Trends
Patterns and developments in the field of cybersecurity.
Content Delivery Network (CDN)
A system of distributed servers that deliver web content based on the user’s location.
Ad Fraud
A deceptive practice used to generate false impressions or clicks on ads.
Cybersecurity Training Programs
Educational initiatives designed to improve individuals' skills in protecting information.
Digital Sovereignty
The concept that countries have authority over their own cyberspaces.
E-Governance Services
Public services and information accessed electronically by citizens.
Cyber Crime Units
Specialized law enforcement teams focused on investigating cybercrime.
Digital Forensics
The process of recovering and investigating material found in digital devices.
Legislation on Cyber Crime
Laws established to define and govern actions considered cybercrimes.
Data Loss Prevention (DLP)
Strategies and tools to ensure sensitive data is not lost or accessed by unauthorized users.
Cybersecurity Insurance
Insurance designed to protect organizations from losses related to cyber incidents.
Emerging Cyber Threats
New and evolving risks to cybersecurity, including phenomena like hacking, phishing, and malware.
Smart Contract Security
Protocols for ensuring the security of digital contracts executed over blockchain.
Digital Currency Regulation
Laws and guidelines governing the use and exchange of digital currencies.
User Behavior Analytics (UBA)
Tools and processes aimed at delivering insights on user actions to identify potential breaches.
Ethical Hacking
The practice of intentionally probing systems for vulnerabilities in order to fix them.
Incident Command System (ICS)
A standardized approach to the command, control, and coordination of emergency response.
Browser Security Features
Settings and functionalities within web browsers that help protect against online threats.
Biometric Data Protection
Safeguarding personal information derived from biometric identifiers.
Cloud Service Model
Types of cloud services like SaaS, PaaS, and IaaS.
User Engagement Metrics
Statistics that measure interactions between users and digital content.
Data Breach Response Plan
Prepared strategies for minimizing damage from data breaches.
IoT Security Frameworks
Guidelines to secure Internet of Things devices and networks.
Legacy System Integration
Connecting older operational systems with latest technologies to ensure smooth data flow.
Social Media Analytics
The process of gathering data from social media platforms to draw insights.
Cybersecurity Testing
Evaluating the security posture of an organization through various methodologies such as penetration testing.
Digital Asset Management
The process of organizing, storing, and retrieving digital assets in a cohesive manner.
Workforce Cybersecurity Training
Programs aimed at increasing employees' knowledge of cybersecurity practices.
Online Messaging Security
Protocols for securing communications transmitted over messaging platforms.
Digital Communication Strategy
Plan for utilizing online channels effectively to communicate with stakeholders.
Vulnerability Disclosure Policy
Guidelines that dictate how vulnerabilities found in software should be reported.