1/28
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Cybersecurity
The practice of protecting systems
Threat
Any potential danger that can exploit a vulnerability
Vulnerability
A weakness in a system that can be exploited by a threat
Exploit
Code or technique used to take advantage of a vulnerability
Malware
Malicious software designed to damage or disrupt systems
Virus
Malware that attaches to legitimate files and spreads when executed
Worm
Self-replicating malware that spreads across networks without user action
Trojan
A malicious program disguised as legitimate software
Ransomware
Malware that encrypts data and demands payment for decryption
Phishing
A social engineering attack that tricks users into revealing sensitive information
Social Engineering
Manipulating people into giving up confidential information
Authentication
The process of verifying a user’s identity
Authorization
Determining what resources an authenticated user can access
CIA Triad
Confidentiality Integrity and Availability—the core principles of cybersecurity
Confidentiality
Ensuring data is only accessible to authorized users
Integrity
Ensuring data is accurate and has not been altered
Availability
Ensuring systems and data are accessible when needed
Encryption
The process of converting data into a secure unreadable format
Plaintext
Data in its original readable form
Ciphertext
Encrypted unreadable data
Firewall
A security system that monitors and controls network traffic
IDS
Intrusion Detection System that monitors for suspicious activity
IPS
Intrusion Prevention System that blocks detected threats
Brute Force Attack
Trying many passwords until the correct one is found
Zero-Day Vulnerability
A vulnerability unknown to the vendor or public
Patch
A software update that fixes security vulnerabilities
Least Privilege
Granting users only the access necessary to perform tasks
Attack Surface
All possible entry points an attacker can exploit
Incident Response
The process of detecting responding to and recovering from a security inciden