DONT USE U5 Cyber Vocabulary

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/140

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:54 PM on 4/22/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

141 Terms

1
New cards

defense in depth (layered security)

2
New cards

a cybersecurity strategy that uses multiple layers of security controls (managerial

technical

3
New cards

layered defense

4
New cards

another term for defense in depth

5
New cards

combines different security tools and policies to address different types of threats

6
New cards

lateral movement

7
New cards

when an adversary moves from one compromised device or account to other parts of a network

8
New cards

privilege escalation

9
New cards

when a user or attacker gains higher access rights than originally authorized

10
New cards

managerial controls

11
New cards

administrative policies and procedures that guide security practices (ex: training

policies)

12
New cards

technical controls

13
New cards

technology-based protections such as firewalls

encryption

14
New cards

physical controls

15
New cards

security measures that protect physical access to systems (locks

cameras

16
New cards

security policy

17
New cards

a formal document outlining how an organization protects its data and systems

18
New cards

procedure

19
New cards

step-by-step instructions explaining how to implement a policy

20
New cards

acceptable use policy (aup)

21
New cards

defines how users are allowed to use an organization's network and devices

22
New cards

password policy

23
New cards

rules requiring strong passwords

password changes

24
New cards

access control

25
New cards

methods used to regulate who can view or use resources

26
New cards

discretionary access control (dac)

27
New cards

access control where the data owner decides who can access resources

28
New cards

mandatory access control (mac)

29
New cards

access control where access is determined by a central authority based on classification levels

30
New cards

data security policy

31
New cards

guidelines for protecting sensitive organizational data

32
New cards

security awareness training

33
New cards

training that teaches users to recognize threats like phishing and social engineering

34
New cards

enterprise security

35
New cards

protection of data

devices

36
New cards

data classification

37
New cards

categorizing data based on sensitivity (public

internal

38
New cards

data at rest

39
New cards

stored data not currently being accessed (protected with encryption and access control)

40
New cards

data in transit (data in motion)

41
New cards

data being transferred across a network (protected with encrypted connections)

42
New cards

data in use

43
New cards

data actively being accessed or processed (protected with authorization controls)

44
New cards

firewall

45
New cards

a device or software that filters network traffic based on rules

46
New cards

network segmentation

47
New cards

dividing a network into smaller sections to improve security and limit lateral movement

48
New cards

logging

49
New cards

recording network and system events for monitoring and investigation

50
New cards

vulnerability

51
New cards

a weakness that could be exploited by a threat

52
New cards

misconfiguration

53
New cards

improper setup of systems or security controls

54
New cards

wireless encryption standards

55
New cards

security protocols for wi-fi networks

56
New cards

wep

57
New cards

weak

outdated encryption

58
New cards

wpa

59
New cards

improved but vulnerable

60
New cards

wpa2

61
New cards

strong encryption

62
New cards

wpa3

63
New cards

most secure current standard

64
New cards

default credentials

65
New cards

pre-set usernames and passwords that must be changed to prevent unauthorized access

66
New cards

captive portal

67
New cards

a web page that users must authenticate through before gaining network access (commonly used on guest wi-fi)

68
New cards

network monitoring

69
New cards

continuous observation of network activity to detect unusual behavior

70
New cards

intrusion detection system (ids)

71
New cards

a tool that passively monitors network traffic and generates alerts when suspicious activity is detected

72
New cards

intrusion prevention system (ips)

73
New cards

a tool that actively monitors and blocks suspicious traffic

74
New cards

log files

75
New cards

records of system and network events used for troubleshooting and investigations

76
New cards

service set identifier (ssid)

77
New cards

the name of a wireless network

78
New cards

perimeter firewall

79
New cards

firewall placed at the network boundary to protect internal systems from external threats

80
New cards

internal firewall

81
New cards

firewall inside a network to separate and protect different segments

82
New cards

host-based firewall

83
New cards

software firewall installed on an individual device

84
New cards

screened subnet / demilitarized zone (dmz)

85
New cards

a network segment between the internal network and the internet that hosts public-facing services

86
New cards

access control list (acl)

87
New cards

an ordered set of firewall rules that allow or deny traffic based on defined criteria

88
New cards

inbound traffic

89
New cards

traffic entering a network

90
New cards

outbound traffic

91
New cards

traffic leaving a network

92
New cards

port

93
New cards

logical communication endpoint identified by a number (ex: 22 for ssh

443 for https)

94
New cards

subnet

95
New cards

a smaller division of a larger ip network

96
New cards

physical segmentation

97
New cards

separating networks using different physical devices (routers

switches)

98
New cards

logical segmentation

99
New cards

separating networks virtually using configuration (vlans

subnetting)

100
New cards

vlan (virtual local area network)