Introduction to Cyber Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

A collection of flashcards covering key terminology and concepts related to the introductory lecture on Cyber Security.

Last updated 1:11 PM on 3/8/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

26 Terms

1
New cards

Computer Security

The protection afforded to an automated information system to preserve the integrity, availability, and confidentiality of information system resources.

2
New cards

Confidentiality

Assures that confidential information is not made available or disclosed to unauthorized individuals.

3
New cards

Integrity

Information and programs are changed only in a specified and authorized manner.

4
New cards

Availability

Ensuring timely and reliable access and use of information by authorized users.

5
New cards

Information Security (InfoSec)

The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

6
New cards

Cyber Security

The practice of protecting systems, networks, and programs from cyber attacks.

7
New cards

Vulnerability

A flaw or weakness in a system’s design, implementation, or operation that could be exploited to violate the system’s security policy.

8
New cards

Threat

A possible danger that might exploit a vulnerability.

9
New cards

Attack

A threat that is carried out, representing a potential harm to the system resource.

10
New cards

Countermeasure

Any means taken to address an attack, prevent an attack from being successful, detect the attack, and recover from the damage due to the attack.

11
New cards

Exploit

A piece of software or a sequence of commands that takes advantage of a bug or vulnerability.

12
New cards

Penetration Testing

The practice of testing an information system, network, or web application to find security vulnerabilities that an attacker could exploit.

13
New cards

Risk

The expected loss due to a particular attack.

14
New cards

Authenticity

The ability to verify that users are who they claim they are, and that the system receives data from a trusted source.

15
New cards

Accountability

The ability to trace back the actions performed by an entity to that entity.

16
New cards

Active Attack

An act that has negative effects on system resources.

17
New cards

Passive Attack

An act to make use of system information that does not affect the system.

18
New cards

Deception

A threat to system or data integrity where an attacker masquerades or falsifies information.

19
New cards

Disruption

A threat to system availability and integrity involving incapacitating or corrupting system resources.

20
New cards

Usurpation

A threat to system integrity where unauthorized actions take over system resources.

21
New cards

OSI Security Architecture

A framework to assess the security needs of an organization and define security requirements.

22
New cards

Security Attack

Any action that compromises the security information owned by an organization.

23
New cards

Security Services

Services that enhance the security of data processing systems and information transfers.

24
New cards

Security Mechanism

A process to detect, prevent, or recover from a security attack.

25
New cards

Threats on Communication Lines

Can be passive or active attacks affecting data transmission.

26
New cards

Vulnerability Assessment

The process of defining, identifying, classifying, and prioritizing vulnerabilities in information systems.

Explore top notes

note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)
note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)

Explore top flashcards

flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)
flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)