Cyber security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/51

flashcard set

Earn XP

Description and Tags

Answer this SHITS

Last updated 11:41 AM on 5/17/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

52 Terms

1
New cards

Personal Info

Stuff that identifies you, like your social security number, driver's license  details, birthday, job title, etc.

2
New cards

 Encryption

Turns your data into a jumbled mess that only authorized people can  unscramble and read.

3
New cards

 Two-Factor Authentication (2FA)

Makes sure it's really you trying to access something  by asking for two types of verification, like a password and a code sent to your phone.

4
New cards

Password Strength

 The complexity of a password, measured by length, character types  (uppercase, lowercase, numbers, symbols), and avoiding common phrases.

5
New cards

Password Manager

A secure application that stores and manages your passwords for  different accounts. 

6
New cards

 Biometrics

 Using unique physical characteristics (fingerprint, face recognition) for  authentication.

7
New cards

 Multi-Factor Authentication (MFA)

A broader term encompassing 2FA, requiring  multiple verification methods. 

8
New cards

 Zero-Trust Security

A security model that assumes no user or device is inherently  trustworthy and requires continuous verification. 


9
New cards

Data Loss Prevention (DLP)

 Strategies and tools to prevent sensitive data from being  leaked or accessed by unauthorized users. 


10
New cards

 Symmetric Encryption

Encryption where the same key is used for both encryption and  decryption. 


11
New cards


Asymmetric Encryption:

Encryption where a public key encrypts data and a private key  decrypts it. 


12
New cards

 Steganography

Hiding information within another file, like hiding a message within an  image. 

13
New cards

 Firewall

A security guard that checks all incoming and outgoing traffic on your computer  network, allowing only the safe stuff through. 


14
New cards

 VPN (Virtual Private Tunnel)

Creates a safe and encrypted connection over the internet,  like a secret tunnel to access a private network securely. 


15
New cards

Security Alarm (IDS)

Keeps an eye on your computer network and sounds the alarm if it  detects suspicious activity. 


16
New cards

Security Guard (IPS)

Not only sounds the alarm but also jumps in to stop suspicious  activity on your computer network.

17
New cards

Port

A virtual doorway on a computer that allows specific types of network traffic

18
New cards

DMZ (Demilitarized Zone)

 A network segment that sits between the internal network  and the public internet, often used to place web servers.

19
New cards

Packet Sniffer

 A tool that captures data packets traveling on a network, which can be  malicious if used by attackers. 

20
New cards

 Web Application Firewall (WAF)

A security system that monitors and filters traffic to  web applications, blocking malicious requests

21
New cards

 Malicious Software (Malware)

Bad software that can harm your computer, steal your  information, or take control of it. Examples include viruses, worms, and ransomware.

22
New cards

Ransomware

 A type of malware that encrypts your files or locks your system,  demanding a ransom for access.

23
New cards

Bluetooth Hacking

Taking advantage of weaknesses in Bluetooth to gain unauthorized

access to devices or steal information.

24
New cards

Denial of Service (DoS) Attack

An attempt to overwhelm a website or service with

traffic, making it unavailable to legitimate users.

25
New cards

Man-in-the-Middle (MitM) Attack

An attack where an attacker intercepts

communication between two parties to steal data or alter messages.

26
New cards

Zero-Day Exploit

A newly discovered vulnerability in software that attackers can exploit

before a patch is available.

27
New cards

SQL Injection

An attack that injects malicious code into a website's database queries to steal data or manipulate it.

28
New cards

Botnet

A network of compromised computers controlled by an attacker to launch large-scale attacks.

29
New cards

Double Check (2FA)

Makes sure it's really you trying to access something by asking for

two types of verification, like a password and a code sent to your phone.

30
New cards

Security Dashboard (SIEM)

Keeps track of all security alerts from your devices and

applications, helping you identify and respond to any problems.

31
New cards

Honeypot

A behavior-based detection tool, computer, or computer system intended to mimic likely targets of cyberattacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cybercriminals operate.

32
New cards

Vulnerability Assessment

The practice of examining a computer system, network, or application to find vulnerabilities that an attacker could exploit.

33
New cards

Penetration Testing (Pen Testing)

Simulating a cyberattack to identify vulnerabilities in a

system's defenses.

34
New cards

Security Awareness Training

Educating employees about cybersecurity best practices to

help them identify and avoid threats.

35
New cards

Patch Management

The process of installing security updates to fix vulnerabilities in

software.

36
New cards

Access Control

Enforcing restrictions on who can access specific systems and data.

37
New cards

Incident Reporting

The process of documenting and reporting security incidents to the

appropriate authorities.

38
New cards

Digital Signature

A mathematical scheme used to verify the authenticity and integrity of a message.

39
New cards

Hashing

A one-way mathematical function that transforms data into a fixed-size string

of characters.

40
New cards

CERT

A Computer Emergency Response Team (CERT) is a team of cybersecurity professionals within an organization whose primary responsibility is to protect the organization's information systems from cyberattacks. They act as the organization's first responders in the event of a security breach.

41
New cards

General Data Protection Regulation (GDPR)

A regulation in EU law on data privacy and security for all individuals within the European Union.

42
New cards

Payment Card Industry Data Security Standard (PCI DSS)

A set of security standards designed to ensure the safe handling of credit card information.

43
New cards

Health Insurance Portability and Accountability Act (HIPAA)

A law in the United States that protects sensitive patient health information.

44
New cards

Social Engineering

Tricking people into giving up their personal information or doing

something that compromises security. It's like a con artist but for the digital world.

45
New cards

Phishing Attack

An attempt to trick someone into revealing personal information or

clicking malicious links, often disguised as legitimate emails or websites.

46
New cards

Pretexting

Creating a fake scenario to gain someone's trust and access sensitive

information.

47
New cards

Tailgating

Physically following someone into a restricted area without authorization.

48
New cards

Quid pro quo

Offering something in exchange for sensitive information.

49
New cards

Endpoint Detection and Response (EDR)

A security tool that monitors endpoints (devices) for suspicious activity and can take automated actions.

50
New cards

Sandboxing

Isolating suspicious code or files in a virtual environment to prevent them from harming the main system.

51
New cards

Cyberwarfare

The use of digital attacks by nation-states to disrupt or damage another country's critical infrastructure.

52
New cards

Dark Web

A part of the internet that is not indexed by search engines and is often used for illegal activities.

Explore top notes

Explore top flashcards

flashcards
Milady Skin structure & growth
44
Updated 793d ago
0.0(0)
flashcards
AP Lang Vocabulary VIII
20
Updated 1161d ago
0.0(0)
flashcards
hot words 11-15
53
Updated 1093d ago
0.0(0)
flashcards
Unit 3: Sensation and Perception
56
Updated 1073d ago
0.0(0)
flashcards
Predator & Prey
29
Updated 1233d ago
0.0(0)
flashcards
IB Bio Nervous System Part II
47
Updated 1073d ago
0.0(0)
flashcards
Milady Skin structure & growth
44
Updated 793d ago
0.0(0)
flashcards
AP Lang Vocabulary VIII
20
Updated 1161d ago
0.0(0)
flashcards
hot words 11-15
53
Updated 1093d ago
0.0(0)
flashcards
Unit 3: Sensation and Perception
56
Updated 1073d ago
0.0(0)
flashcards
Predator & Prey
29
Updated 1233d ago
0.0(0)
flashcards
IB Bio Nervous System Part II
47
Updated 1073d ago
0.0(0)