Cybersecurity Terms (copy)

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions
Get a hint
Hint

Cybersecurity (or security)

1 / 15

flashcard set

Earn XP

Description and Tags

Terms and definitions from Course 1, Module 1

16 Terms

1

Cybersecurity (or security)

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

New cards
2

Cloud security

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

New cards
3

Internal threat

A current or former employee, external vendor, or trusted partner who poses a security risk

New cards
4

Network security

The practice of keeping an organization's network infrastructure secure from unauthorized access

New cards
5

Personally identifiable information (PII)

Any information used to infer an individual’s identity

New cards
6

Security posture

An organization’s ability to manage its defense of critical assets and data and react to change

New cards
7

Sensitive personally identifiable information (SPII)

A specific type of PII that falls under stricter handling guidelines

New cards
8

Technical skills

Skills that require knowledge of specific tools, procedures, and policies

New cards
9

Threat

Any circumstance or event that can negatively impact assets

New cards
10

Threat actor

Any person or group who presents a security risk

New cards
11

Transferable skills

Skills from other areas that can apply to different careers

New cards
12

Computer Virus

Malicious code is written to Interfere with computer operations and cause damage to data & software.

New cards
13

Malware

Software designed to harm devices or networks.

New cards
14

Brain Virus

The virus was created by Pakistani brothers Amjad and Basit Farooq Alvi to track and stop illegal copies of their program, while also gauging piracy. The virus could sometimes destroy data, but it was not designed to corrupt data or spread chaos

New cards
15

Morris Worm

The worm sought out computers running a particular version of the UNIX operating system and spread rapidly by exploiting security flaws known by Morris and other skilled programmers.

New cards
16

Social Engineering

The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

New cards
robot