Connecting Computers - Cybersecurity Review

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

These flashcards cover key terms and concepts from the lecture on cybersecurity and networking, focusing on attacks, network protocols, security measures, and important principles.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

LAN

Local Area Network; a network that connects computers within a limited area.

2
New cards

Ransomware

Malicious software designed to block access to a computer system until a sum of money is paid.

3
New cards

Colonial Pipeline Attack

A ransomware attack on the Colonial Pipeline in May 2021 that disrupted fuel supply on the East Coast of the U.S.

4
New cards

DarkSide

A ransomware gang known for its operational methods and refusal to attack Russian interests.

5
New cards

Botnet

A network of compromised machines controlled by an attacker, often used for malicious purposes.

6
New cards

Phishing

A method of trying to gather personal information using deceptive emails and websites.

7
New cards

Packet switching

A method of data transmission where data is broken into packets that are sent independently across the network.

8
New cards

Network Protocols

Agreed-upon standards for data transmission over a network.

9
New cards

Encryption

The process of converting information into a code to prevent unauthorized access.

10
New cards

Access Control

A method to ensure that only authorized users can access certain data or systems.

11
New cards

CIA Triad

A model designed to guide policies for information security consisting of Confidentiality, Integrity, and Availability.

12
New cards

ACK-based protocols

Protocols that use acknowledgment signals to ensure reliable delivery of packets.

13
New cards

Cryptocurrency

A digital or virtual currency that uses cryptography for security.

14
New cards

Least Privilege

A principle of providing users only the permissions necessary to perform their tasks.

15
New cards

Error detection

Techniques used to identify and correct errors in transmitted data.

16
New cards

Multi-factor authentication

A security system that requires more than one method of authentication from independent categories of credentials.

17
New cards

Denial of Service (DoS)

A cyberattack that aims to make a machine or network resource unavailable to its intended users.

18
New cards

Vulnerability

A weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.

19
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.