Cybersecurity NOCTI Vocabulary Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

flashcard set

Earn XP

Description and Tags

Cybersecurity NOCTI Vocabulary Flashcards

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Confidentiality (CIA Triad)

Ensures that information is accessible only to authorized users

2
New cards

Integrity (CIA Triad)

Ensures that data remains accurate and unaltered by unauthorized parties

3
New cards

Availability (CIA Triad)

Ensures that authorized users have timely access to information and resources

4
New cards

Threat

A potential danger or actor that could exploit a weakness in a system

5
New cards

Vulnerability

A flaw or weakness in a system that could be exploited by a threat

6
New cards

Risk

The potential for loss or damage when a threat exploits a vulnerability

7
New cards

IP Address

A unique numerical label assigned to a device on a network using the Internet Protocol

8
New cards

MAC Address

A hardware identifier burned into a network interface card, consisting of 12 hexadecimal digits

9
New cards

DNS (Domain Name System)

A service that translates human-friendly domain names (like example.com) into IP addresses for routing

10
New cards

DHCP (Dynamic Host Configuration Protocol)

A network protocol that automatically assigns IP addresses and other configuration details (subnet mask, gateway, etc.) to devices on a network

11
New cards

Subnet

A segmented portion of a larger network, identified by an IP range and mask, that improves network efficiency

12
New cards

NAT (Network Address Translation)

A technique that maps private internal IP addresses to a public IP address when leaving the network

13
New cards

VPN (Virtual Private Network)

A service that creates an encrypted, secure tunnel over a public network

14
New cards

TCP (Transmission Control Protocol)

A connection-oriented protocol ensuring reliable, ordered delivery of data between devices

15
New cards

UDP (User Datagram Protocol)

A connectionless protocol that sends packets (datagrams) without guaranteeing delivery

16
New cards

Symmetric Encryption

An encryption method using the same secret key for both encryption and decryption

17
New cards

Asymmetric Encryption (Public-Key Cryptography)

Uses a mathematically related key pair (public and private) to encrypt and decrypt data

18
New cards

Hash (Checksum)

A fixed-length string output by a hash algorithm (like MD5 or SHA-256) that uniquely represents data; any change in the data will change the hash

19
New cards

Digital Signature

A piece of data encrypted with a sender’s private key so that anyone with the sender’s public key can verify the sender and check data integrity

20
New cards

SSL/TLS (HTTPS)

Protocols that encrypt communications between a web browser and server

21
New cards

Malware

Short for malicious software; any software or code designed to harm or exploit a device or network

22
New cards

Virus

Malware that attaches itself to legitimate files or programs and replicates when those files execute

23
New cards

Worm

A self-replicating malware that spreads through networks without needing to infect files

24
New cards

Trojan Horse

Malware disguised as a harmless program

25
New cards

Ransomware

Malware that encrypts a victim’s files and demands payment for the decryption key

26
New cards

Phishing

A social engineering attack using deceptive emails or messages that appear legitimate to steal credentials or data

27
New cards

DDoS (Distributed Denial of Service)

An attack that overwhelms a target (server or network) with traffic from many sources, disrupting its normal function

28
New cards

Man-in-the-Middle (MitM)

An attack where an attacker secretly intercepts or relays communication between two parties to steal data

29
New cards

Authentication

Verifying the identity of a user or device, typically via something they know (password), have (token), or are (biometric)

30
New cards

Authorization

Granting an authenticated user permission to access specific resources or actions

31
New cards

Multi-Factor Authentication (MFA)

A security method requiring two or more different authentication factors (e.g. password plus a phone-delivered code)

32
New cards

Biometric Authentication

Using a unique physical trait (fingerprint, face, iris) to verify identity

33
New cards

Chain of Custody

A documented record of how digital evidence was collected, transferred, and handled

34
New cards

Forensic Image

A verified, bit-by-bit copy of a storage device made for analysis

35
New cards

Write Blocker

A device that allows read-only access to a storage medium to prevent any changes to the evidence

36
New cards

Firewall

A network security device or software that filters incoming and outgoing traffic based on rules, blocking unauthorized access

37
New cards

Intrusion Detection System (IDS)

A security tool that monitors network or system traffic for suspicious activity and alerts administrators

38
New cards

Intrusion Prevention System (IPS)

Like an IDS but placed inline so it can automatically block or reject detected malicious traffic

39
New cards

Anti-Virus / Anti-Malware

Software that scans files and memory for known malware signatures and removes or quarantines infected files

40
New cards

Access Control List (ACL)

A set of rules that specifies which users or network traffic are allowed or denied access to a resource

41
New cards

Honeypot

A decoy system set up to attract attackers and detect their methods

42
New cards

Patch Management

The practice of applying software updates that fix security vulnerabilities

43
New cards

Data Backup

Creating copies of data so it can be restored in case of loss or corruption

44
New cards

DMZ (Demilitarized Zone)

A perimeter network that hosts public-facing services with limited access to the internal LAN, adding an extra security layer