1/18
These flashcards cover key terms and concepts from the lecture on cybersecurity and networking, focusing on attacks, network protocols, security measures, and important principles.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
LAN
Local Area Network; a network that connects computers within a limited area.
Ransomware
Malicious software designed to block access to a computer system until a sum of money is paid.
Colonial Pipeline Attack
A ransomware attack on the Colonial Pipeline in May 2021 that disrupted fuel supply on the East Coast of the U.S.
DarkSide
A ransomware gang known for its operational methods and refusal to attack Russian interests.
Botnet
A network of compromised machines controlled by an attacker, often used for malicious purposes.
Phishing
A method of trying to gather personal information using deceptive emails and websites.
Packet switching
A method of data transmission where data is broken into packets that are sent independently across the network.
Network Protocols
Agreed-upon standards for data transmission over a network.
Encryption
The process of converting information into a code to prevent unauthorized access.
Access Control
A method to ensure that only authorized users can access certain data or systems.
CIA Triad
A model designed to guide policies for information security consisting of Confidentiality, Integrity, and Availability.
ACK-based protocols
Protocols that use acknowledgment signals to ensure reliable delivery of packets.
Cryptocurrency
A digital or virtual currency that uses cryptography for security.
Least Privilege
A principle of providing users only the permissions necessary to perform their tasks.
Error detection
Techniques used to identify and correct errors in transmitted data.
Multi-factor authentication
A security system that requires more than one method of authentication from independent categories of credentials.
Denial of Service (DoS)
A cyberattack that aims to make a machine or network resource unavailable to its intended users.
Vulnerability
A weakness in a system that can be exploited by threats to gain unauthorized access or cause harm.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.