Introduction to Cyber Security: Cloud Security & Artificial Intelligence

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

flashcard set

Earn XP

Description and Tags

The flashcards cover key concepts and vocabulary from the lecture notes on Cyber Security, Cloud Security, and Artificial Intelligence.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Cloud Computing

A model for delivering information technology services through the internet.

2
New cards

Private Cloud

A cloud infrastructure operated solely for a single organization.

3
New cards

Public Cloud

A cloud infrastructure made available to the general public.

4
New cards

SaaS (Software as a Service)

Software distribution model in which applications are hosted by a service provider.

5
New cards

PaaS (Platform as a Service)

Cloud computing model that provides a platform allowing customers to develop, run, and manage applications.

6
New cards

IaaS (Infrastructure as a Service)

Cloud computing model that provides virtualized computing resources over the internet.

7
New cards

CSP (Cloud Service Provider)

A third-party company offering cloud computing services.

8
New cards

CASB (Cloud Access Security Broker)

A security policy enforcement point placed between cloud service users and providers.

9
New cards

Encryption

The process of converting information into a code to prevent unauthorized access.

10
New cards

Key Management

The management of cryptographic keys for a cryptographic system.

11
New cards

Data Loss Prevention (DLP)

Strategies to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

12
New cards

Vendor Lock-In

The difficulty and expense of migrating to a new vendor's services.

13
New cards

Multi-Tenant Environment

A single instance of software serves multiple customers.

14
New cards

Hypervisor

Software that creates and runs virtual machines.

15
New cards

Containerization

A lightweight alternative to full machine virtualization that involves encapsulating an application in a container.

16
New cards

Machine Learning

A subset of AI that enables machines to improve at tasks through experience.

17
New cards

Deep Learning

A subset of machine learning that uses neural networks to analyze various factors of data.

18
New cards

Generative AI

AI that can create new content such as images, text, or audio based on learned data.

19
New cards

Overwriting

The process of replacing data with new data.

20
New cards

Degaussing

Using a magnetic field to erase data from magnetic media.

21
New cards

Crypto Shredding

Erasing encryption keys to render encrypted data unusable.

22
New cards

ITAR (International Traffic in Arms Regulations)

U.S. regulations governing the export of defense and military-related technologies.

23
New cards

EAR (Export Administration Regulations)

U.S. regulations that control the export of dual-use items.

24
New cards

Object-Based Storage

Data storage architecture that manages data as objects.

25
New cards

Content Delivery Network (CDN)

A network of servers that delivers content to users based on their geographic location.

26
New cards

Homomorphic Encryption

An encryption method that allows computations on ciphertexts.

27
New cards

Least Privilege

A security principle that grants users only the access necessary to perform their tasks.

28
New cards

Monitoring

The practice of overseeing cloud application and infrastructure for performance and security.

29
New cards

Access Controls

Mechanisms that restrict access to resources based on predefined security policies.

30
New cards

Service Permissions

Permissions that dictate what operations can be performed on cloud services.

31
New cards

Legal Seizure

When law enforcement can take control of physical or virtual properties as part of an investigation.

32
New cards

Rogue Administrator

A malicious insider who abuses their access to perform unauthorized actions.

33
New cards

AI Prompts

Instructions given to an AI system to guide its output.

34
New cards

Statistical Analysis

The process of collecting and analyzing data to identify patterns.

35
New cards

Feedback Loop

A system where outputs are circled back and used as inputs.

36
New cards

Agentic AI

AI systems capable of independently planning and acting towards complex goals.

37
New cards

Adaptive Learning

The ability of AI systems to improve through experience.

38
New cards

Autonomy

The capability of an AI system to operate independently.

39
New cards

AI Risk Categories

Classification of risks associated with the deployment of AI systems.

40
New cards

Deepfake

Synthetic media in which a person's likeness is replaced with that of another using artificial intelligence.

41
New cards

AI Transparency

The extent to which AI systems are understandable and accountable.

42
New cards

Data Poisoning

Attacks that manipulate training data to compromise machine learning models.

43
New cards

Bias in AI

Systematic and unfair discrimination based on the data used to train AI.