1/30
These flashcards cover essential vocabulary terms related to cybersecurity concepts, models, tools, and techniques. They are designed for students to enhance their understanding and recall of important terms in preparation for their exams.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Gap Analysis
The process of identifying differences between an organization's current security posture and its desired security posture.
Zero Trust Security
A cybersecurity model that eliminates implicit trust from networks and requires continuous verification of all users and devices before access is granted.
Data Plane
The component responsible for defining and managing security policies in a Zero Trust architecture.
Control Plane
The component responsible for enforcing security policies established by the Data Plane.
Adaptive Identity
A Zero Trust Control Plane approach that takes into account user identity, device security, network conditions, and other contextual information for dynamic access decisions.
Policy Decision Point (PDP)
The part of the Zero Trust Control Plane responsible for making decisions about access based on defined policies.
Policy Enforcement Point (PEP)
A Data Plane component that enforces the security policies originating from the Control Plane's Policy Decision Point.
Mantrap
A physical security access control system to prevent unauthorized users from gaining access to restricted areas.
Honeypot
A security resource that mimics real systems to attract cyber attackers and contain apparent vulnerabilities for monitoring.
Honeynet
A network of honeypots designed to gather information on attackers.
Honeyfile
A type of file placed within a network to attract unauthorized users or cyber attackers.
Honeytoken
A unique identifier designed to track attackers.
Business Impact Analysis (BIA)
A process used to assess and evaluate the potential impact of disruptive incidents on critical business functions.
Public Key Infrastructure (PKI)
A hierarchical system for managing digital certificates, including their creation, distribution, and revocation.
Key Escrow
A cryptographic technique that enables storing copies of encryption keys with a trusted third party.
Self-Encrypting Drive (SED)
A data storage device with built-in hardware-level encryption functionality.
Full Disk Encryption (FDE)
Software technology designed to provide confidentiality for an entire data storage device.
Encrypting File System (EFS)
A Windows component that enables encryption of individual files.
Hypertext Transfer Protocol Secure (HTTPS)
A network protocol that secures web traffic via SSL/TLS encryption.
Internet Protocol Security (IPsec)
A suite of protocols providing encryption, authentication, and integrity for network traffic.
Virtual Private Network (VPN)
A system that creates private encrypted connections over a public network.
Transport Layer Security (TLS)
A cryptographic protocol providing secure communication over a computer network, succeeding SSL.
Asymmetric Encryption
An encryption method where a public key is used for encryption and a private key for decryption.
Key Management
The process of managing cryptographic keys within a cryptographic system.
Salting
A cryptographic technique involving adding data to passwords before hashing to enhance security against attacks.
Digital Signature
A cryptographic technique for verifying the authenticity and integrity of digital messages or documents.
Public Key Cryptosystem
A cryptosystem that uses a public and private key pair for secure data transmission.
Registration Authority (RA)
A trusted entity that accepts requests for digital certificates and authenticates the requesting entity.
Certificate Authority (CA)
A trusted third party responsible for issuing, revoking, and managing digital certificates.
Certificate Revocation List (CRL)
A means for publishing digital certificates that have been revoked.
Online Certificate Status Protocol (OCSP)
A protocol for on-demand querying of the revocation status of a digital certificate.