1/42
The flashcards cover key concepts and vocabulary from the lecture notes on Cyber Security, Cloud Security, and Artificial Intelligence.
Name  | Mastery  | Learn  | Test  | Matching  | Spaced  | 
|---|
No study sessions yet.
Cloud Computing
A model for delivering information technology services through the internet.
Private Cloud
A cloud infrastructure operated solely for a single organization.
Public Cloud
A cloud infrastructure made available to the general public.
SaaS (Software as a Service)
Software distribution model in which applications are hosted by a service provider.
PaaS (Platform as a Service)
Cloud computing model that provides a platform allowing customers to develop, run, and manage applications.
IaaS (Infrastructure as a Service)
Cloud computing model that provides virtualized computing resources over the internet.
CSP (Cloud Service Provider)
A third-party company offering cloud computing services.
CASB (Cloud Access Security Broker)
A security policy enforcement point placed between cloud service users and providers.
Encryption
The process of converting information into a code to prevent unauthorized access.
Key Management
The management of cryptographic keys for a cryptographic system.
Data Loss Prevention (DLP)
Strategies to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
Vendor Lock-In
The difficulty and expense of migrating to a new vendor's services.
Multi-Tenant Environment
A single instance of software serves multiple customers.
Hypervisor
Software that creates and runs virtual machines.
Containerization
A lightweight alternative to full machine virtualization that involves encapsulating an application in a container.
Machine Learning
A subset of AI that enables machines to improve at tasks through experience.
Deep Learning
A subset of machine learning that uses neural networks to analyze various factors of data.
Generative AI
AI that can create new content such as images, text, or audio based on learned data.
Overwriting
The process of replacing data with new data.
Degaussing
Using a magnetic field to erase data from magnetic media.
Crypto Shredding
Erasing encryption keys to render encrypted data unusable.
ITAR (International Traffic in Arms Regulations)
U.S. regulations governing the export of defense and military-related technologies.
EAR (Export Administration Regulations)
U.S. regulations that control the export of dual-use items.
Object-Based Storage
Data storage architecture that manages data as objects.
Content Delivery Network (CDN)
A network of servers that delivers content to users based on their geographic location.
Homomorphic Encryption
An encryption method that allows computations on ciphertexts.
Least Privilege
A security principle that grants users only the access necessary to perform their tasks.
Monitoring
The practice of overseeing cloud application and infrastructure for performance and security.
Access Controls
Mechanisms that restrict access to resources based on predefined security policies.
Service Permissions
Permissions that dictate what operations can be performed on cloud services.
Legal Seizure
When law enforcement can take control of physical or virtual properties as part of an investigation.
Rogue Administrator
A malicious insider who abuses their access to perform unauthorized actions.
AI Prompts
Instructions given to an AI system to guide its output.
Statistical Analysis
The process of collecting and analyzing data to identify patterns.
Feedback Loop
A system where outputs are circled back and used as inputs.
Agentic AI
AI systems capable of independently planning and acting towards complex goals.
Adaptive Learning
The ability of AI systems to improve through experience.
Autonomy
The capability of an AI system to operate independently.
AI Risk Categories
Classification of risks associated with the deployment of AI systems.
Deepfake
Synthetic media in which a person's likeness is replaced with that of another using artificial intelligence.
AI Transparency
The extent to which AI systems are understandable and accountable.
Data Poisoning
Attacks that manipulate training data to compromise machine learning models.
Bias in AI
Systematic and unfair discrimination based on the data used to train AI.