Cybersecurity: Virus Detection, Policies, and Digital Forensics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Virus

Malicious code that attaches to specific file types (like .exe, .doc, .pdf) and spreads when those files are opened.

2
New cards

Heuristic Scanning

A virus detection method that looks for suspicious behavior instead of known virus signatures.

3
New cards

Sandbox Scanning

Runs a file in a safe, isolated virtual environment to see if it behaves like malware.

4
New cards

Firewall

A security system that monitors and controls incoming and outgoing network traffic based on rules.

5
New cards

SIEM (Security Information and Event Management)

A system that collects, analyzes, and reports security logs from multiple sources in real time.

6
New cards

Dual-Homed Host

A computer with two network interfaces that connects two separate networks.

7
New cards

Network-Based Host

A security system placed on the network to monitor traffic rather than on individual computers.

8
New cards

Security Policy

A formal set of rules that define how an organization protects its information and systems.

9
New cards

User Policy

Rules that define what users can and cannot do on a company's systems.

10
New cards

DRP (Disaster Recovery Plan)

A plan for restoring systems and data after a disaster or cyberattack.

11
New cards

Gray Area of Acceptable Use

Activities not clearly allowed or forbidden but could still cause problems.

12
New cards

System Administration Policies

Rules for how administrators configure, manage, and secure systems.

13
New cards

What Happens When an Employee Leaves an Organization

Access is removed, accounts are disabled, passwords changed, and company property is retrieved.

14
New cards

Implicit Deny

A security rule that blocks everything unless it is explicitly allowed.

15
New cards

First Rule of Security

Nothing is 100% secure.

16
New cards

Minimum Password Age

The minimum amount of time a user must keep a password before changing it.

17
New cards

Good Password Length (Text Standard)

At least 12-16 characters.

18
New cards

System Hardening

The process of securing a system by removing unnecessary services and tightening settings.

19
New cards

DMZ (Demilitarized Zone)

A network area between the internal network and the internet used for public services.

20
New cards

Nessus

A vulnerability scanner used to find security weaknesses.

21
New cards

Shodan

A search engine for finding internet-connected devices.

22
New cards

Cyber Terrorism (FBI Definition)

A cyberattack intended to cause fear, damage infrastructure, or disrupt society for political reasons.

23
New cards

Flame Virus

A very advanced espionage malware used for spying on governments.

24
New cards

Economic Attack

A cyberattack meant to damage a country's economy or financial systems.

25
New cards

Stuxnet

A cyber weapon that targeted nuclear facilities in Iran.

26
New cards

Information Warfare

The use of information and cyber tools to gain military or political advantage.

27
New cards

Propaganda Agent

A person or tool used to spread misleading or biased information.

28
New cards

Country That Sends ~800 Million Spam Emails Per Day

United States.

29
New cards

Sex Offender Registries

Public databases listing convicted sex offenders and their locations.

30
New cards

Federal Prison Record Site

BOP (Federal Bureau of Prisons) Inmate Locator.

31
New cards

Usenet

An early internet discussion system still used for file sharing.

32
New cards

inurl

Google search operator that finds keywords inside website URLs.

33
New cards

intitle

Google search operator that finds keywords inside webpage titles.

34
New cards

Maltego

A digital investigation tool used for mapping relationships and finding data.

35
New cards

First Responder to Computer Crime

The first person who secures the computer or digital evidence.

36
New cards

Consequence of Proper Evidence Handling

Evidence remains admissible in court.

37
New cards

Forensically Valid Copy

An exact, verified duplicate of digital data made for investigation.

38
New cards

md5sum

A hashing tool used to verify data integrity.

39
New cards

Chain of Custody

A log that tracks who handled evidence and when.

40
New cards

Computer Evidence

Any digital data used in a legal investigation.

41
New cards

DiskDigger

A file recovery and digital forensics tool.