Information Security and Cybercrime

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Information Security

practice of protecting data from unauthorized access, alteration, or destruction

2
New cards

Cybersecurity

subset of information security focused on protecting digital systems, networks, and data from cyber threats

3
New cards

CIA Traid

three fundamental principles of security:

  • Confidentiality

  • Integrity

  • Availability

4
New cards

Confidentiality

ensuring the data is accessible only to authorized individuals

5
New cards

Integrity

preventing unauthorized modification of data

6
New cards

Availability

ensuring data and service are accessible when needed

7
New cards

Vulnerability

weakness in software, hardware, or configuration that can be exploited

8
New cards

Exploit

method or tool used to take advantage of a vulnerability

9
New cards

Threat

person, organization, or event that has the potential to harm data security

10
New cards

Risk

potential financial or operational loss due to security threats

11
New cards

Zero-Day Vulnerability

security flaw discovered before a fix is available

12
New cards

Authentication

verifying a user’s identity before granting access

13
New cards

Authorization

assigning access rights based on authentication

14
New cards

Biometric Authentication

using physical attributes like fingerprints or facial recognition for authentication

15
New cards

Audit Logs

records that track user actions within a system for security monitoring

16
New cards

Black Hat Hacker

malicious hacker who exploits security flaws for personal or financial gain

17
New cards

White Hat Hacker

ethical hacker who helps organizations find and fix security vulnerabilities

18
New cards

Gray Hat Hacker

hacker who investigates security flaws without malicious intent but without permission

19
New cards

Hacktivist

hacker who uses cyber techniques for social or political activism

20
New cards

Cyberterrorist

hacker who targets government or critical infrastructure for ideological reasons

21
New cards

Malicious Insider

employee who intentionally misuses access to harm a company

22
New cards

Phishing

fraudulent email-based attack that tricks users into revealing sensitive information

23
New cards

Spear-Phishing

targeted phishing attack aimed at specific individuals or organizations

24
New cards

Whale-Phishing

phishing attack targeting high-profile executives or influential figures

25
New cards

Smishing & Vishing

fraudulent attacks using SMS (Smishing) or voice calls (Vishing)

26
New cards

QR Code Scams

fraudulent QR codes leading users to malicious sites

27
New cards

Ransomware

malware that encrypts files and demands payment for decryption

28
New cards

Distributed Denial of Service (DDoS)

attack that overwhelms a system with traffic to make it unavailable

29
New cards

Trojan Horse

malicious software disguised as a legitimate program

30
New cards

Worm

type of malware that spreads across networks without user action

31
New cards

Spyware

software that secretly collects data from a user’s system

32
New cards

Keylogger

software or hardware that records keystrokes to steal passwords

33
New cards

Social Engineering

manipulating people into divulging confidential information

34
New cards

Pretexting

deceiving someone to gain access to sensitive information

35
New cards

Shoulder Surfing

observing a person entering sensitive data, such as passwords

36
New cards

Data Breach

unauthorized exposure or theft of sensitive data

37
New cards

Identity Theft

using stolen personal information for fraud

38
New cards

Firewall

security system that filters incoming and outgoing network traffic

39
New cards

Intrusion Detection System (IDS)

monitors system activity to detect unauthorized access

40
New cards

Antivirus Software

scans for and removes malicious programs

41
New cards

Least Privilege Principle

ensuring users only have access to what is necessary for their role

42
New cards

Security Awareness Training

educating employees to recognize and avoid cyber threats

43
New cards

Computer Fraud and Abuse Act (CFAA)

US law protecting against unauthorized computer access

44
New cards

National Infrastructure Protection Act (NIPA)

focuses on securing critical infrastructure

45
New cards

Patriot Act

enhances cybersecurity monitoring for national security purposes

46
New cards

Copyright Laws & Intellectual Property Protections

regulate the legal use of digital content and prevent unauthorized copying

47
New cards

Risk Mitigation

implementing safeguards to reduce risk

48
New cards

Risk Acceptance

acknowledging a risk but deciding not to act against it

49
New cards

Incident Response Plan

structured approach for handling security breaches

50
New cards

Computer Forensics

practice of collecting and analyzing digital evidence for security investigations