Cybersecurity Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/30

flashcard set

Earn XP

Description and Tags

These flashcards cover essential vocabulary terms related to cybersecurity concepts, models, tools, and techniques. They are designed for students to enhance their understanding and recall of important terms in preparation for their exams.

Last updated 9:29 PM on 1/31/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

31 Terms

1
New cards

Gap Analysis

The process of identifying differences between an organization's current security posture and its desired security posture.

2
New cards

Zero Trust Security

A cybersecurity model that eliminates implicit trust from networks and requires continuous verification of all users and devices before access is granted.

3
New cards

Data Plane

The component responsible for defining and managing security policies in a Zero Trust architecture.

4
New cards

Control Plane

The component responsible for enforcing security policies established by the Data Plane.

5
New cards

Adaptive Identity

A Zero Trust Control Plane approach that takes into account user identity, device security, network conditions, and other contextual information for dynamic access decisions.

6
New cards

Policy Decision Point (PDP)

The part of the Zero Trust Control Plane responsible for making decisions about access based on defined policies.

7
New cards

Policy Enforcement Point (PEP)

A Data Plane component that enforces the security policies originating from the Control Plane's Policy Decision Point.

8
New cards

Mantrap

A physical security access control system to prevent unauthorized users from gaining access to restricted areas.

9
New cards

Honeypot

A security resource that mimics real systems to attract cyber attackers and contain apparent vulnerabilities for monitoring.

10
New cards

Honeynet

A network of honeypots designed to gather information on attackers.

11
New cards

Honeyfile

A type of file placed within a network to attract unauthorized users or cyber attackers.

12
New cards

Honeytoken

A unique identifier designed to track attackers.

13
New cards

Business Impact Analysis (BIA)

A process used to assess and evaluate the potential impact of disruptive incidents on critical business functions.

14
New cards

Public Key Infrastructure (PKI)

A hierarchical system for managing digital certificates, including their creation, distribution, and revocation.

15
New cards

Key Escrow

A cryptographic technique that enables storing copies of encryption keys with a trusted third party.

16
New cards

Self-Encrypting Drive (SED)

A data storage device with built-in hardware-level encryption functionality.

17
New cards

Full Disk Encryption (FDE)

Software technology designed to provide confidentiality for an entire data storage device.

18
New cards

Encrypting File System (EFS)

A Windows component that enables encryption of individual files.

19
New cards

Hypertext Transfer Protocol Secure (HTTPS)

A network protocol that secures web traffic via SSL/TLS encryption.

20
New cards

Internet Protocol Security (IPsec)

A suite of protocols providing encryption, authentication, and integrity for network traffic.

21
New cards

Virtual Private Network (VPN)

A system that creates private encrypted connections over a public network.

22
New cards

Transport Layer Security (TLS)

A cryptographic protocol providing secure communication over a computer network, succeeding SSL.

23
New cards

Asymmetric Encryption

An encryption method where a public key is used for encryption and a private key for decryption.

24
New cards

Key Management

The process of managing cryptographic keys within a cryptographic system.

25
New cards

Salting

A cryptographic technique involving adding data to passwords before hashing to enhance security against attacks.

26
New cards

Digital Signature

A cryptographic technique for verifying the authenticity and integrity of digital messages or documents.

27
New cards

Public Key Cryptosystem

A cryptosystem that uses a public and private key pair for secure data transmission.

28
New cards

Registration Authority (RA)

A trusted entity that accepts requests for digital certificates and authenticates the requesting entity.

29
New cards

Certificate Authority (CA)

A trusted third party responsible for issuing, revoking, and managing digital certificates.

30
New cards

Certificate Revocation List (CRL)

A means for publishing digital certificates that have been revoked.

31
New cards

Online Certificate Status Protocol (OCSP)

A protocol for on-demand querying of the revocation status of a digital certificate.