Additional Terminology

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

Comp Sci

Last updated 11:14 PM on 1/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

Buffer Overflow Attacks

A buffer overflow attack typically involves violating programming languages and overwriting the bounds of the buffers they exist on.

2
New cards

Cross-site Scripting (X-SS)

Cross-site scripting (XSS) is a web security issue that sees cyber criminals execute malicious scripts on legitimate or trusted websites.

3
New cards

Exploit Development

To use someone or something unfairly for your own advantage: Laws exist to stop companies exploiting their employees

4
New cards

Hacker

A hacker is a person who breaks into a computer system.

5
New cards

IP Address

An IP address is like a digital street address for your device (phone, computer, etc.) on the internet, a unique set of numbers (e.g., 192.168.0.1) that lets other devices find it, send data to it, and receive information from it, making online communication possible.

6
New cards

Malware

Malware (malicious software) is any bad program that secretly invades your device to steal data, spy on you, lock your files (ransomware), or just mess things up, often for money or sabotage.

7
New cards

Network Mapping

Network mapping is the process of visually representing network structure, including devices, connections and data flow, to help IT teams analyze, monitor and manage network performance effectively.

8
New cards

Network Scanning

Network scanning is a process used to identify active devices (hosts), services running on them, and other details about the system and network.

9
New cards

Network Topology

A network topology is the physical and logical arrangement of nodes and connections in a network.

10
New cards

Open-source Intelligence (OSINT)

Open Source Intelligence (OSINT) is the practice of collecting, analyzing, and extracting valuable insights from publicly available information to produce actionable intelligence for decision-making.

11
New cards

OS Detection

Operating system (OS) detection is a feature in Nmap that remotely scans a target host and presents details of its operating system if there is a match.

12
New cards

Password Craking Tool

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system.

13
New cards

Penetration Testing

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.

14
New cards

Port Scanning

A port scan is a common technique hackers use to discover open doors or weak points in a network.

15
New cards

Pretexting

Pretexting is a certain type of social engineering technique that manipulates victims into divulging information.

16
New cards

Response Plan

A response plan is a documented, step-by-step strategy outlining how an organization detects, acts upon, and recovers from emergencies or security incidents.

17
New cards

Search Engine Dorking

This is a technique using specialized search operators to find security vulnerabilities, sensitive data and hidden information indexed by search engines, that are not accessible by standard queries.

18
New cards

Security Posture Assessment

A security posture assessment is a structured, organization-wide evaluation of cybersecurity readiness.

19
New cards

Social Engineering Attacks

A security posture assessment is a structured, organization-wide evaluation of cybersecurity readiness.

20
New cards

SQL Injection

A web security vulnerability allows attackers to interfere with queries an application makes to the database.

21
New cards

System Forensics

System Forensics is the process of retrieving useful information from the Operating System (OS) of the computer or mobile device in question.

22
New cards

Testing: Black Box

Black box testing involves testing a system with no prior knowledge of its internal workings.

23
New cards

Testing: Grey Box

A gray box assessment is a structured evaluation based on the available knowledge of the system under test.

24
New cards

Testing: White Box

White box testing is an approach that allows testers to inspect and verify the inner workings of a software system.

25
New cards

Vishing (Voice Phishing)

Refers to fraudulent phone calls or voice messages designed to trick victims into providing sensitive information, like login credentials, credit card numbers, or bank details