Risk, Assessment, and Security Planning

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/140

flashcard set

Earn XP

Description and Tags

Flashcards covering mobile security, risk assessment, wireless networks, and OS security concepts from Android to iOS.

Last updated 2:36 PM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

141 Terms

1
New cards

Risk Assessment

A review used to see what security risks exist and whether anything has changed since the last assessment, such as new threats, new technology, or new system requirements.

2
New cards

Security Audit

A security checkup that reviews whether systems, controls, and policies are working correctly.

3
New cards

Asset

Anything valuable that needs protection, such as data, phones, apps, servers, user accounts, or networks.

4
New cards

Threat

Anything that could harm a system or data, such as malware, hackers, stolen devices, or unsafe networks.

5
New cards

Vulnerability

A weakness that could be attacked or used to cause damage.

6
New cards

Mitigation

A way to reduce risk or limit damage, such as encryption, firewalls, strong passwords, or remote wiping.

7
New cards

Interception

When data traveling over a network is captured or listened to by someone else.

8
New cards

Availability

Making sure systems, apps, and services are working and available when people need them.

9
New cards

Service Level Agreement, or SLA

An agreement that says how reliable or available a service should be.

10
New cards

Access

The places or methods people use to connect to a network, especially remote users or users connecting to the outside internet.

11
New cards

Control

A security protection used to lower risk.

12
New cards

Fault-Tolerant Design

A system design that keeps working even if one part fails.

13
New cards

High-Availability Design

A design focused on keeping systems online with little downtime.

14
New cards

Single Point of Failure

One part of a system that can make the whole system fail if it breaks.

15
New cards

Firewall

A tool that controls what network traffic is allowed in or out.

16
New cards

Intrusion Prevention System, or IPS

A security tool that detects and blocks suspicious or harmful network activity.

17
New cards

SSL/VPN Concentrator

A device or system that handles secure VPN connections for remote users.

18
New cards

Demilitarized Zone, or DMZ

A separate network area used for public-facing systems so the private internal network stays safer.

19
New cards

Virtual Private Network, or VPN

An encrypted connection that lets someone securely access a private network over the internet.

20
New cards

Vulnerability Assessment

The process of finding, reviewing, and recording weaknesses in a system or network.

21
New cards

Vulnerability Scanner

A tool that automatically checks systems for known weaknesses, missing patches, open ports, or unsafe services.

22
New cards

Nessus

A vulnerability scanning tool used to find security weaknesses.

23
New cards

Saint

A tool used to scan systems and networks for vulnerabilities.

24
New cards

OpenVAS

An open-source tool used to scan for security problems.

25
New cards

Open Port

A network port that is accepting connections. It can be needed, but it can also be risky if exposed.

26
New cards

Missing Patch

A security update that has not been installed yet.

27
New cards

Version Analysis

A scanning method that checks software versions to see if they are outdated or vulnerable.

28
New cards

Behavior Analysis

A scanning method that looks at how a system responds to requests to find unusual or unsafe behavior.

29
New cards

Defense in Depth

Using many layers of security instead of relying on just one protection.

30
New cards

Screen Lock

A lock on a device that requires a password, PIN, pattern, face scan, or fingerprint.

31
New cards

Encrypted Drive

Storage that protects data so it cannot be read without the correct key or password.

32
New cards

Remote Wiping

Erasing data from a device remotely if it is lost or stolen.

33
New cards

Qualitative Risk Analysis

A risk review based on judgment, such as labeling risk as low, medium, or high.

34
New cards

Quantitative Risk Analysis

A risk review that uses money values and calculations.

35
New cards

Exposure Factor, or EF

The percentage of an asset that would be lost or damaged by a threat.

36
New cards

Single Loss Expectancy, or SLE

How much money one security incident is expected to cost.

37
New cards

Annual Rate of Occurrence, or ARO

How often a risk is expected to happen in one year.

38
New cards

Annualized Loss Expectancy, or ALE

How much money a risk is expected to cost per year.

39
New cards

ALE Formula

ALE=SLE×AROALE = SLE \times ARO

40
New cards

Authenticator

The device that controls whether a client can join the network, usually the access point.

41
New cards

Beacon Frame

A signal sent by an access point so devices can find the Wi-Fi network.

42
New cards

Client Device

The phone, laptop, tablet, or other device trying to connect to the network.

43
New cards

Access Request

A request from a device asking to join a network.

44
New cards

Credentials

Proof of identity, such as a username, password, certificate, or key.

45
New cards

EAPoL, or Extensible Authentication Protocol over LAN

A protocol that carries login/authentication messages between a client and an access point.

46
New cards

RADIUS Protocol

A protocol that sends login/authentication requests from the access point to an authentication server.

47
New cards

Authentication Server

A server that checks whether a user or device is allowed to connect.

48
New cards

Temporal Keys

Temporary encryption keys given to an approved device to protect its wireless traffic.

49
New cards

Border Crossing Search Zone

A 100-mile zone near the U.S. border where device search rules may be different.

50
New cards

Fourth Amendment

Protects people from unreasonable searches and seizures, but protections can be weaker near borders.

51
New cards

Fifth Amendment

Protects people from self-incrimination. Passcodes can be safer legally than fingerprints or face unlock.

52
New cards

Passcode

A typed PIN or password used to unlock a device.

53
New cards

Biometric Unlock

Unlocking a device with a fingerprint, face scan, or other body-based method.

54
New cards

Burner Phone

A temporary phone used to protect privacy or reduce risk while traveling.

55
New cards

Routine Traffic Stop

A normal police stop while driving where users cannot be forced to unlock phones.

56
New cards

Mobile Malware

Malicious software made to harm or spy on mobile devices.

57
New cards

Operating System Attack, or OS Attack

An attack that targets the phone’s operating system, such as Android or iOS.

58
New cards

Side-Loaded Mobile Application

An app installed from outside the official app store.

59
New cards

Unauthorized Third-Party Site

A website that is not an official app store and may offer unsafe app downloads.

60
New cards

Communication Attack

An attack on data while it is being sent between devices, networks, or servers.

61
New cards

Lack of User Awareness

When users do not understand security risks, such as fake Wi-Fi, unsafe apps, or suspicious permissions.

62
New cards

Uninstalled System Updates

Updates that were not installed, leaving the device open to known security problems.

63
New cards

Mobile Browsing Vulnerability

A weakness from using a mobile browser, such as unsafe websites, tracking, or browser exploits.

64
New cards

USB Connection Risk

The risk from plugging a phone into unknown or unsafe USB ports or devices.

65
New cards

Bluetooth Connection Risk

The risk from Bluetooth connections, especially if the device pairs with unknown devices.

66
New cards

Android

A mobile operating system based on Linux that is often targeted by attackers due to its popularity.

67
New cards

Android Fragmentation

The problem of Android being used on many different devices with different hardware, updates, and OS versions.

68
New cards

Rooting

Giving yourself full control over an Android device, which gives more freedom but weakens security.

69
New cards

Root Access

The highest level of system permission.

70
New cards

Trojan

Malware that pretends to be a normal or useful app.

71
New cards

Peer-to-Peer, or P2P, Software Sharing Site

A file-sharing site where users trade files directly; often used to spread infected apps.

72
New cards

Android Software Development Kit, or Android SDK

The official set of tools used to create and analyze Android apps.

73
New cards

Compile

To turn source code into an app or program that can run.

74
New cards

Decompile

To turn an app back into readable code or a readable structure.

75
New cards

Android Security Model

Android’s security system that uses Linux permissions, app sandboxing, and controlled access to resources.

76
New cards

Linux Kernel

The core part of Android that manages memory, apps, hardware, and permissions.

77
New cards

Process Sandboxing

Running each app separately so it cannot easily affect other apps.

78
New cards

Dalvik Virtual Machine, or Dalvik VM

The older Android environment where apps ran in their own isolated space.

79
New cards

Virtual Machine, or VM

A software environment that runs code separately from other parts of the system.

80
New cards

Android Sandbox

The system that keeps each Android app separate with its own files, memory, user ID, and permissions.

81
New cards

Unique User ID

A separate ID given to each Android app so Android can keep apps isolated.

82
New cards

File-System Permissions

Rules that control which apps or users can access certain files.

83
New cards

API, or Application Programming Interface

A set of functions that apps use to communicate with the operating system or services.

84
New cards

Android Permission Model

The system where apps must ask permission before using protected resources like the camera, location, contacts, or storage.

85
New cards

Device Owner Permission

Approval from the phone’s owner to let an app use certain resources.

86
New cards

Stack Overflow

A memory problem where too much data goes into the stack and may allow attacks.

87
New cards

Kernel Address Leak

When secret memory location information from the kernel is exposed.

88
New cards

Integer Overflow

A bug where a number becomes too large for the space it is stored in.

89
New cards

Format String Protection

Protection against attacks that abuse badly handled text formatting in code.

90
New cards

No-eXecute, or NX

A security feature that stops code from running in memory areas where it should not run.

91
New cards

Stack

A memory area used for temporary information and function calls.

92
New cards

Heap

A memory area used for data that programs create while running.

93
New cards

Cryptographic APIs

Tools apps use to encrypt, decrypt, hash, or protect data.

94
New cards

Crypto Primitives

Basic building blocks of cryptography, like encryption, hashing, and digital signatures.

95
New cards

Boot Loader

The software that starts before the operating system and loads it.

96
New cards

Apple iOS Operating System Component-Layered Model

iOS security built in layers, including system architecture, encryption/data protection, and network security.

97
New cards

System Architecture

The iOS layer that protects the device using hardware, the OS platform, sandboxing, and app isolation.

98
New cards

Application Isolation

Keeping apps separate so one app cannot freely access another app’s data or the system.

99
New cards

Keychain Data Protection

Protection for sensitive saved data like passwords, tokens, and keys.

100
New cards

Transport Layer Security, or TLS

A newer and stronger protocol used to encrypt network traffic.