Cybersecurity Course 5 Glossary Terms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/116

flashcard set

Earn XP

Description and Tags

A complete set of vocabulary flashcards covering the cybersecurity terms and definitions from the provided Course 5 transcript.

Last updated 7:16 AM on 5/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

117 Terms

1
New cards

Advanced persistent threat (APT)

An instance when a threat actor maintains unauthorized access to a system for an extended period of time

2
New cards

Angler phishing

A technique where attackers impersonate customer service representatives on social media

3
New cards

Access controls

Security controls that manage access, authorization, and accountability of information

4
New cards

Adware

A type of legitimate software that is sometimes used to display digital advertisements in applications

5
New cards

Algorithm

A set of rules used to solve a problem

6
New cards

Application programming interface (API) token

A small block of encrypted code that contains information about a user

7
New cards

Asset

An item perceived as having value to an organization

8
New cards

Asset classification

The practice of labeling assets based on sensitivity and importance to an organization

9
New cards

Asset inventory

A catalog of assets that need to be protected

10
New cards

Asset management

The process of tracking assets and the risks that affect them

11
New cards

Asymmetric encryption

The use of a public and private key pair for encryption and decryption of data

12
New cards

Attack surface

The characteristics and features of the areas where an attack can come from

13
New cards

Baiting

A social engineering tactic that tempts people into compromising their security

14
New cards

Attack tree

A diagram that maps threats to assets

15
New cards

Attack vector

The pathways attackers use to penetrate security defenses

16
New cards

Basic auth

The technology used to establish a user’s request to access a server

17
New cards

Bit

The smallest unit of data measurement on a computer

18
New cards

Botnet

A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder"

19
New cards

Brute force attack

The trial and error process of discovering private information

20
New cards

Bug bounty

Programs that encourage freelance hackers to find and report vulnerabilities

21
New cards

Cipher

An algorithm that encrypts information

22
New cards

Common Vulnerabilities and Exposures (CVE®) list

An openly accessible dictionary of known vulnerabilities and exposures

23
New cards

Common Vulnerability Scoring System (CVSS)

A measurement system that scores the severity of a vulnerability

24
New cards

Compliance

The process of adhering to internal standards and external regulations

25
New cards

Cross-site scripting (XSS)

An injection attack that inserts code into a vulnerable website or web application

26
New cards

Cryptojacking

A form of malware that installs software to illegally mine cryptocurrencies

27
New cards

Encryption

The process of converting data from a readable format to an encoded format

28
New cards

Cryptographic key

A mechanism that decrypts ciphertext

29
New cards

Cryptography

The process of transforming information into a form that unintended readers can’t understand

30
New cards

CVE Numbering Authority (CNA)

An organization that volunteers to analyze and distribute information on eligible CVEs

31
New cards

Data

Information that is translated, processed, or stored by a computer

32
New cards

Data at rest

Data not currently being accessed

33
New cards

Data in transit

Data traveling from one point to another

34
New cards

Data in use

Data being accessed by one or more users

35
New cards

Data custodian

Anyone or anything that’s responsible for the safe handling, transport, and storage of information

36
New cards

Data owner

The person that decides who can access, edit, use, or destroy their information

37
New cards

Defense in depth

A layered approach to vulnerability management that reduces risk

38
New cards

Digital certificate

A file that verifies the identity of a public key holder

39
New cards

DOM-based XSS attack

An instance when malicious script exists in the webpage a browser loads

40
New cards

Dropper

A type of malware that comes packed with malicious code which is delivered and installed onto a target system

41
New cards

Exploit

A way of taking advantage of a vulnerability

42
New cards

Hacker

Any person who uses computers to gain access to computer systems, networks, or data

43
New cards

Hash collision

An instance when different inputs produce the same hash value

44
New cards

Exposure

A mistake that can be exploited by a threat

45
New cards

Fileless malware

Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer

46
New cards

Hash function

An algorithm that produces a code that can’t be decrypted

47
New cards

Hash table

A data structure that's used to store and reference hash values

48
New cards

Identity and access management (IAM)

A collection of processes and technologies that helps organizations manage digital identities in their environment

49
New cards

Information privacy

The protection of unauthorized access and distribution of data

50
New cards

Information security (InfoSec)

The practice of keeping data in all states away from unauthorized users

51
New cards

Injection attack

Malicious code inserted into a vulnerable application

52
New cards

Input validation

Programming that validates inputs from users and other programs

53
New cards

Intrusion detection system (IDS)

An application that monitors system activity and alerts on possible intrusions

54
New cards

Loader

A type of malware that downloads strains of malicious code from an external source and installs them onto a target system

55
New cards

Malware

Software designed to harm devices or networks

56
New cards

MITRE

A collection of non-profit research and development centers

57
New cards

Multi-factor authentication (MFA)

A technology that requires at least two distinct forms of identification

58
New cards

National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

59
New cards

Non-repudiation

The concept that the authenticity of information can’t be denied

60
New cards

OAuth

An open-standard authorization protocol that shares designated access between applications

61
New cards

Process of Attack Simulation and Threat Analysis (PASTA)

A popular threat modeling framework that’s used across many industries

62
New cards

Payment Card Industry Data Security Standards (PCI DSS)

A set of security standards formed by major organizations in the financial industry

63
New cards

Personally identifiable information (PII)

Any information used to infer an individual's identity

64
New cards

Phishing

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

65
New cards

Phishing kit

A collection of software tools needed to launch a phishing campaign

66
New cards

Policy

A set of rules that reduce risk and protect information

67
New cards

Potentially unwanted application (PUA)

A type of unwanted software that is bundled in with legitimate programs which might display ads, cause device slowdown, or install other software

68
New cards

Prepared statement

A coding technique that executes SQL statements before passing them onto the database

69
New cards

Principle of least privilege

The concept of granting only the minimal access and authorization required to complete a task or function

70
New cards

Procedures

Step-by-step instructions to perform a specific security task

71
New cards

Protected health information (PHI)

Information that relates to the past, present, or future physical or mental health or condition of an individual

72
New cards

Public key infrastructure (PKI)

An an encryption framework that secures the exchange of online information

73
New cards

Quid pro quo

A type of baiting used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money

74
New cards

Rainbow table

A file of pre-generated hash values and their associated plaintext

75
New cards

Ransomware

Type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access

76
New cards

Regulations

Rules set by a government or other authority to control the way something is done

77
New cards

Reflected XSS attack

An instance when malicious script is sent to a server and activated during the server’s response

78
New cards

Risk

Anything that can impact confidentiality, integrity, or availability of an asset

79
New cards

Rootkit

Malware that provides remote, administrative access to a computer

80
New cards

Salting

An additional safeguard that’s used to strengthen hash functions

81
New cards

Security controls

Safeguards designed to reduce specific security risks

82
New cards

Spear phishing

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

83
New cards

Scareware

Malware that employs tactics to frighten users into infecting their device

84
New cards

Security assessment

A check to determined how resilient current security implementations against threats

85
New cards

Security audit

A review of an organization's security controls, policies, and procedures against a set of expectations

86
New cards

Security hardening

The process of strengthening a system to reduce its vulnerability and attack surface

87
New cards

Separation of duties

The principle that users should not be given levels of authorization that would allow them to misuse a system

88
New cards

Session

A sequence of network HTTP basic auth requests and responses associated with the same user

89
New cards

Session cookie

A token that websites use to validate a session and determine how long that session should last

90
New cards

Session hijacking

An event when attackers obtain a legitimate user’s session ID

91
New cards

Session ID

A unique token that identifies a user and their device while accessing a system

92
New cards

Single sign-on (SSO)

A technology that combines several different logins into one

93
New cards

Smishing

The use of text messages to trick users to obtain sensitive information or to impersonate a known source

94
New cards

Social engineering

A manipulation technique that exploits human error to gain private information, access, or valuables

95
New cards

Spyware

Malware that’s used to gather and sell information without consent

96
New cards

SQL (Structured Query Language)

A programming language used to create, interact with, and request information from a database

97
New cards

Threat actor

Any person or group who presents a security risk

98
New cards

Virus

Malicious code written to interfere with computer operations and cause damage to data and software

99
New cards

Vulnerability

A weakness that can be exploited by a threat

100
New cards

SQL injection

An attack that executes unexpected queries on a database