Intro To Cybersecurity Code

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:13 PM on 1/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

Cybersecurity

The practice of protecting systems

2
New cards

Threat

Any potential danger that can exploit a vulnerability

3
New cards

Vulnerability

A weakness in a system that can be exploited by a threat

4
New cards

Exploit

Code or technique used to take advantage of a vulnerability

5
New cards

Malware

Malicious software designed to damage or disrupt systems

6
New cards

Virus

Malware that attaches to legitimate files and spreads when executed

7
New cards

Worm

Self-replicating malware that spreads across networks without user action

8
New cards

Trojan

A malicious program disguised as legitimate software

9
New cards

Ransomware

Malware that encrypts data and demands payment for decryption

10
New cards

Phishing

A social engineering attack that tricks users into revealing sensitive information

11
New cards

Social Engineering

Manipulating people into giving up confidential information

12
New cards

Authentication

The process of verifying a user’s identity

13
New cards

Authorization

Determining what resources an authenticated user can access

14
New cards

CIA Triad

Confidentiality Integrity and Availability—the core principles of cybersecurity

15
New cards

Confidentiality

Ensuring data is only accessible to authorized users

16
New cards

Integrity

Ensuring data is accurate and has not been altered

17
New cards

Availability

Ensuring systems and data are accessible when needed

18
New cards

Encryption

The process of converting data into a secure unreadable format

19
New cards

Plaintext

Data in its original readable form

20
New cards

Ciphertext

Encrypted unreadable data

21
New cards

Firewall

A security system that monitors and controls network traffic

22
New cards

IDS

Intrusion Detection System that monitors for suspicious activity

23
New cards

IPS

Intrusion Prevention System that blocks detected threats

24
New cards

Brute Force Attack

Trying many passwords until the correct one is found

25
New cards

Zero-Day Vulnerability

A vulnerability unknown to the vendor or public

26
New cards

Patch

A software update that fixes security vulnerabilities

27
New cards

Least Privilege

Granting users only the access necessary to perform tasks

28
New cards

Attack Surface

All possible entry points an attacker can exploit

29
New cards

Incident Response

The process of detecting responding to and recovering from a security inciden