Cybersecurity Concepts Flashcards

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/152

flashcard set

Earn XP

Description and Tags

These flashcards cover essential cybersecurity concepts and terminology from the lecture notes, providing definitions for key terms and processes in the field.

Last updated 2:07 AM on 4/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

153 Terms

1
New cards

Cyber counterintelligence (CCI)

Threat intelligence collected from proactively established security infrastructure.

2
New cards

Configuration management and planning

Activities that involve setting directions, expectations, strategies, and formal documentation for precise configuration management.

3
New cards

Technical threat intelligence

Provides information about an attacker’s resources, such as command/control channels and tools, with a shorter lifespan than other types of intelligence.

4
New cards

Ethical hacker obligations

Must have a signed contract providing permission to perform the test.

5
New cards

Entity-driven hunting

A type of threat hunting prioritizing hunts over critical assets to enhance success rate and protect resources.

6
New cards

Host-based assessment

Vulnerability assessment involving configuration checks to identify possible vulnerabilities.

7
New cards

Purple team

Mediates negotiations between aggressor and defending teams in cybersecurity operations.

8
New cards

Incident disclosure

Post-incident activity where organizations share incident details with stakeholders after consulting legal.

9
New cards

Incident containment

Step in IH&R process where handlers alert service providers and manufacturers about affected resources.

10
New cards

Post-incident activities

IH&R activities such as documentation, impact analysis, policy review, and disclosure.

11
New cards

Incident classification

Triage step that involves gathering information to determine incident category and resolution time.

12
New cards

Information security team

Team of individuals skilled in detecting and analyzing security incidents.

13
New cards

Containment actions

Element of IRP that assists in preventing further damage during an incident.

14
New cards

IR officer

Individual overseeing all IR activities in an organization.

15
New cards

Gray hats

Threat actors who both help find vulnerabilities and assist vendors in improving products.

16
New cards

Misconfiguration

Category of vulnerabilities identified by an overall assessment of network connections.

17
New cards

Ransomware

Type of malware that restricts access to system files and demands payment for removal.

18
New cards

Unstructured external threats

Threat category demonstrated when a hacker cannot compromise a properly secured system.

19
New cards

Adware

Type of PUA that displays ads and can disrupt user experience.

20
New cards

Default password and settings

Vulnerability illustrated when credentials are left unchanged after software installation.

21
New cards

Drive-by downloads

Method how malware gets installed automatically when users click on a malicious advertisement.

22
New cards

Gaining access

Phase of hacking where the attacker exploits the system to take control.

23
New cards

Bluesmacking

Type of Bluetooth attack that floods target devices with oversized packets.

24
New cards

Active attack

Type of attack where an attacker manipulates critical information directly.

25
New cards

Cross-site request forgery attack

One-click attack where a hacker tricks a user’s browser into sending unauthorized requests.

26
New cards

Adaptive chosen-plaintext attack

Attack where the adversary has complete access to plaintext and can modify message content.

27
New cards

Advanced persistent threats

Network attacks aiming to gain unauthorized access and remain undetected over time.

28
New cards

Vishing

Technique using pre-recorded messages to deceive victims into revealing sensitive information.

29
New cards

Reactive approach

Network defense strategy addressing threats that preventive measures did not avert.

30
New cards

Preventive approach

Network defense strategy implementing biometric security techniques.

31
New cards

Confidentiality

Information security element allowing secure transaction details visibility.

32
New cards

Network security devices

Technical security controls that protect servers from DoS attacks.

33
New cards

Core

Component of NIST Cybersecurity Framework offering operations and activities for security outcomes.

34
New cards

Respond

CSF function allowing control of impacts of cybersecurity events.

35
New cards

Threat researcher

IH&R role responsible for gathering information on prevalent incidents.

36
New cards

Biometric authentication

Method using facial features to authenticate employees.

37
New cards

User accounts

Default operating system accounts with limited privileges.

38
New cards

Principle of least privilege (POLP)

Access principle ensuring users can only access necessary resources required for job tasks.

39
New cards

Password authentication

Common method for logging into secure portals.

40
New cards

Separation of duties (SoD)

Access control principle ensuring no individual has full authorization rights.

41
New cards

Discretionary access control (DAC)

Access control model determining user access and usage policies.

42
New cards

Root account

Account provided for administrative activities with elevated privileges.

43
New cards

Issue-specific security policy (ISSP)

Policy outlining necessary technologies and preventive measures in an organization.

44
New cards

Procedural security requirements

High-level security requirements demonstrated during threat mitigation activities.

45
New cards

SOX

Act enhancing penalties for white-collar crimes.

46
New cards

Unclassified

Security label requiring no access permissions for document retrieval.

47
New cards

Standards

Mandatory controls for enforcing security policies.

48
New cards

FISMA

Act providing a framework for information security effectiveness.

49
New cards

LEVEL 2 - Managed

Capability maturity model level characterized by managed project processes.

50
New cards

Standby on-line hybrid

Type of UPS used to provide power during outages.

51
New cards

Reception area

Common entry point for physical breaches in organizations.

52
New cards

Compensating controls

Alternative physical security controls used when primary measures fail.

53
New cards

Hot and cold aisles

Arrangement to maintain proper airflow in server rooms.

54
New cards

Terrorism

Physical threat involving planting bombs to impact security.

55
New cards

Document the entire cable infrastructure

Best practice for secured network cabling.

56
New cards

X-ray inspection systems

Detection devices for scanning entry points for suspect objects.

57
New cards

Pure honeypot

Honeypot that emulates a real production network to attract attackers.

58
New cards

VPN concentrator

Component responsible for maintaining each tunnel in a remote VPN.

59
New cards

Internal bastion host

Bastion host located in LAN facilitating local communication.

60
New cards

False negative

Alert condition when an IDS fails to detect an attack.

61
New cards

Bitdefender

Antivirus software using behavioral detection to monitor active applications.

62
New cards

Circuit-level gateway

Firewall technology filtering traffic based on session rules.

63
New cards

IPsec

Network security protocol providing authentication and encryption for VPN data.

64
New cards

Governance

Function assessing application security management in an organization.

65
New cards

Damages reputation

Impact of a successful application-level attack on organization profiles.

66
New cards

Intelligence

SSF domain focusing on understanding attack models for security planning.

67
New cards

Fault tolerance

Software design strategy enhancing robustness despite faults.

68
New cards

Burp Suite

Tool assisting in mapping application attack surfaces and identifying vulnerabilities.

69
New cards

Continuous deployment

Area of automation allowing development and testing processes to be automated.

70
New cards

Production

Tier in the secure application development lifecycle where applications are deployed.

71
New cards

Governance

SAMM function for managing application security in organizations.

72
New cards

CaaS

Type of cloud computing service enabling scalable containerized applications.

73
New cards

OS-assisted virtualization

Virtualization approach employing binary translation for resource type compatibility.

74
New cards

Cloud service provider

Responsible for securing shared infrastructure in cloud environments.

75
New cards

Edge computing

Advanced cloud technology processing small, urgent operations in milliseconds.

76
New cards

High availability across zones

Cloud security control ensuring application uptime during network downtimes.

77
New cards

Desktop virtualization

Virtualization allowing user control of a system instance in the cloud.

78
New cards

Perform an audit

Technique to avoid VM sprawl by tracking associated VMs.

79
New cards

Wireless modem

Device connecting PCs to a wireless network and the Internet via ISP.

80
New cards

WPA2-Enterprise

Wireless encryption technology using RADIUS for client authentication.

81
New cards

Hotspot

Location offering public Wi-Fi for device connectivity to the Internet.

82
New cards

802.11e

Standard defining QoS for wireless applications.

83
New cards

Shared key authentication process

Wi-Fi method securing shared keys distinct from communication channels.

84
New cards

WEP

Preferred encryption mode for securing wireless networks.

85
New cards

Keep the AP away from metal objects

Guideline for optimizing AP placement in wireless setups.

86
New cards

Physical risks and challenges

Security challenges related to mobile device portability and theft.

87
New cards

Wi-Fi Direct

Technology enabling peer-to-peer communication between devices.

88
New cards

Mobile threat defense solution

Solution protecting mobile endpoints from phishing and malware attacks.

89
New cards

Mobile content management

Security solution enabling secure data access on mobile devices.

90
New cards

Application-based risks

Risks arising from malicious or vulnerable mobile applications.

91
New cards

Set Bluetooth-enabled devices to non-discoverable mode

Security guideline for Bluetooth use in public settings.

92
New cards

Corporate owned, personally enabled (COPE)

Policy for employee device management within organizations.

93
New cards

Level 5 (enterprise network)

Corporate level in the Purdue model allowing B2B and B2C operations.

94
New cards

VSAT

ISO standard for long-range wireless communication via satellite.

95
New cards

NTP

Protocol used for clock synchronization between computer systems.

96
New cards

MAC authentication

Security control protecting IT/OT environments at the Purdue level 0.

97
New cards

Cloud layer

IoT architecture layer providing dashboards for resource monitoring.

98
New cards

NFC

Wireless communication technology enabling contactless transactions.

99
New cards

Device layer

IoT architecture layer enhancing security through data processing.

100
New cards

Device-to-device

IoT communication model demonstrated in health monitoring scenarios.