Chapter 1 Basic Structures: Sets, Functions, Sequences, Sums, and Matrices

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

Cybersecurity

Protecting digital systems and data from attacks that steal

2
New cards

Black Hat Hacker

A criminal who breaks into systems to steal data or cause harm for personal gain

3
New cards

White Hat Hacker

Security expert who finds flaws to fix them legally and ethically

4
New cards

Gray Hat Hacker

Hacks without permission but may report flaw if it benefits their agenda

5
New cards

Hacktivist

Hacker attacking to promote political or social causes

6
New cards

Script Kiddie

Unskilled person using ready-made tools for simple attacks for fun or attention

7
New cards

State-Sponsored Hacker

Attacker funded by government to spy

8
New cards

Cybercriminal

Organized group stealing billions through ransomware

9
New cards

Data is Currency

Valuable asset in cybersecurity like cash

10
New cards

Vulnerability

Weakness in system that attackers can exploit to gain unauthorized access

11
New cards

Threat

Potential danger that could exploit a vulnerability to cause harm

12
New cards

Attack

Actual event when threat exploits vulnerability to compromise system

13
New cards

Input Validation

Checking user input before processing to block malicious code like SQL injection

14
New cards

Bounds Checking

Preventing data from overflowing memory buffers to stop buffer overflow exploits

15
New cards

BYOD

Bring Your Own Device - personal phones/tablets accessing company networks increasing risk

16
New cards

IoT

Internet of Things - smart devices like cameras and locks expanding attack surface

17
New cards

Big Data

Large complex datasets hard to protect but highly valuable to attackers

18
New cards

APT

Advanced Persistent Threat - stealthy attack that stays hidden for months inside one target

19
New cards

Algorithm Attack

Uses system behavior like energy usage to identify targets or trigger false alerts

20
New cards

Federated Identity

One login works across multiple organizations - risky if one system is breached

21
New cards

911 Networks

Vulnerable because they use VoIP instead of traditional phone lines

22
New cards

NIST Framework

US standard dividing cybersecurity work into 7 key job categories

23
New cards

CompTIA Security+

Entry-level certification proving basic security knowledge and practices

24
New cards

CEH

Certified Ethical Hacker - proves understanding of hacking techniques and practices

25
New cards

CISSP

Advanced certification for managers validating enterprise security experience

26
New cards

CISM

Certified Information Security Manager - focuses on designing and overseeing security policies

27
New cards

Least Privilege

Give users only the minimum access needed to perform their job

28
New cards

Defense in Depth

Using multiple layers of protection (firewall

29
New cards

Phishing

Tricking people into giving passwords via fake emails or websites

30
New cards

Ransomware

Malware that locks files and demands payment to unlock them

31
New cards

DDoS Attack

Overloading server with fake traffic to crash it and deny service

32
New cards

Social Engineering

Manipulating people into revealing secrets through psychological manipulation

33
New cards

Zero-One Matrix

Matrix with only 0s and 1s used to model access rights (yes/no)

34
New cards

Boolean Product

Uses AND/OR logic on zero-one matrices to calculate reachable access paths

35
New cards

Malware

Any software designed to harm systems including viruses

36
New cards

Encryption

Scrambling data so only authorized users can read it

37
New cards

Authentication

Verifying identity through methods like passwords

38
New cards

Authorization

Determining what an authenticated user is allowed to do

39
New cards

Firewall

Network barrier blocking unauthorized traffic based on predefined rules

40
New cards

Patch

Software update fixing known vulnerability - must be installed promptly

41
New cards

Audit Log

Record of system events used to trace who did what and when

42
New cards

Backup

Copy of data stored separately for recovery after ransomware or breach

43
New cards

Incident Response

Plan for detecting

44
New cards

Digital Forensics

Investigating cybercrimes by collecting and analyzing digital evidence

45
New cards

Insider Threat

Attack from within organization by employee or contractor with access

46
New cards

External Threat

Attack from outside exploiting vulnerabilities in networked devices

47
New cards

Exploit

Code or technique used to take advantage of vulnerability

48
New cards

Zero-Day Attack

Exploiting vulnerability before vendor releases patch

49
New cards

Social Media Risk

Sharing personal info online helps attackers guess passwords

50
New cards

Pharming

Redirecting users from legitimate sites to fake ones even with correct URL

51
New cards

Man-in-the-Middle

Attacker intercepting communication between two parties to steal data

52
New cards

Spoofing

Faking identity like fake email sender

53
New cards

Trojan Horse

Malware disguised as legitimate software that users install unknowingly

54
New cards

Worm

Self-replicating malware that spreads without user action

55
New cards

RAT

Remote Access Trojan giving attacker full control over infected device

56
New cards

Keylogger

Software recording every key pressed to steal passwords and sensitive input

57
New cards

Credential Stuffing

Using leaked passwords from one site to try logging in on other sites

58
New cards

Brute Force Attack

Trying every possible password until correct one is found

59
New cards

Dictionary Attack

Trying common passwords from a list instead of all possibilities

60
New cards

Waterfall Model

Linear software development phases: Analyze → Design → Code → Test → Maintain

61
New cards

Agile Methodology

Iterative development with short cycles (sprints)

62
New cards

Threat Modeling

Identifying potential security threats during design phase

63
New cards

Secure Coding Standards

Practices to prevent common security vulnerabilities in code

64
New cards

Automated Security Testing

Using tools to detect security issues automatically during development

65
New cards

Vulnerability Scanning

Checking for security weaknesses before deployment in production

66
New cards

Data Classification

Labeling data by sensitivity level to apply proper protection

67
New cards

Incident Report

Documenting what happened during a breach for learning and legal purposes

68
New cards

Cybersecurity Law

Legal rules governing data protection

69
New cards

Privacy vs Security

Tension between protecting data and respecting personal freedom

70
New cards

Cybersecurity Specialist

Someone who uses hacker skills to protect systems and data

71
New cards

Cybersecurity is Shared Responsibility

Everyone in organization plays role in security

72
New cards

Vulnerability Database

Public list of known flaws like CVE to help patch systems faster

73
New cards

Honeynet

Network of decoy systems that attract attackers to study their methods

74
New cards

InfraGard

US program sharing cyber threat intelligence between government and private sector

75
New cards

Threat Intelligence

Information about emerging threats used to predict and prevent attacks

76
New cards

Cyber Hygiene

Basic security habits like updating software

77
New cards

Security Awareness

Training users to recognize threats like phishing and social engineering

78
New cards

Attack Surface

All possible entry points an attacker can use - reduce to improve security

79
New cards

Zero Trust

Security model that assumes no one is trusted - verify everything always

80
New cards

Two-Factor Auth (2FA)

Requires two proofs of identity like password + SMS code

81
New cards

Endpoint Security

Protecting devices like laptops and phones with security software

82
New cards

Cloud Security

Protecting data and apps stored in cloud using shared responsibility model

83
New cards

Supply Chain Attack

Attacker compromises third-party vendor to reach main target

84
New cards

AI in Cybersecurity

Used to detect anomalies and predict attacks but can also be used by attackers

85
New cards

Ethical Hacking

Legally testing systems for flaws with permission from owners

86
New cards

Penetration Test

Simulated attack to find weaknesses with authorization from owners

87
New cards

Security Policy

Formal rules for protecting data that must be clear

88
New cards

Risk Assessment

Identifying threats

89
New cards

Data at Rest

Data stored on device or medium when not being actively used or transmitted

90
New cards

Data in Transit

Data being transferred between systems or devices over network

91
New cards

Data in Process

Data being actively used

92
New cards

Packet Sniffing

Attack where attacker intercepts data traveling across network

93
New cards

Rogue Device

Unauthorized hardware connected to network that can steal or disrupt data

94
New cards

Network Access Control (NAC)

Requires devices to meet security policies before connecting

95
New cards

Content Filtering

Blocking access to harmful or inappropriate websites or content

96
New cards

VPN

Virtual Private Network encrypting data between user and network to protect data in transit

97
New cards

Encryption at Rest

Protecting stored data by encrypting it on disk or storage devices

98
New cards

Encryption in Transit

Protecting data while moving across networks using protocols like TLS

99
New cards

Data Loss Prevention (DLP)

Tools that detect and prevent unauthorized transfer or leakage of sensitive data

100
New cards

Security Audit

Independent review of security controls to ensure compliance with policies and standards