TSA: Cybersecurity

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

flashcard set

Earn XP

Description and Tags

Credit and terms goes to https://www.simplilearn.com/top-cybersecurity-terms-you-need-to-know-article

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards
Authentication
The process of identifying a user’s identity so they can have access to the system (Accomplished by a password, retina (eye) scan, fingerprint scan, or a combination of the above)
2
New cards
Botnet
Combo of the words “robot” and “network”; network of computers that have been infected with a virus that are working on security breaches
3
New cards
Data Breach
The result of a hacker successfully breaking into a system and exposing its data (such as credit card numbers, bank accounts, Social Security numbers, and other private, sensitive information.
4
New cards
DDoS
Stands for, “Distributed Denial of Service” and commonly used by Black Hats. Hackers bombard a website with requests up until it locks the system and forces it temprarily shut down
5
New cards
Domain
A series of computers and routers, printer, and scanners, that are all connected as one entity.
6
New cards
Encryption
A piece of information that is coded; like a top-secret, coded spy message
7
New cards
Exploit
An attack on a computer system either by a series of commands, malicious software, or piece of infected data
8
New cards
Firewall
Software or hardware that keeps intruders out
9
New cards
Hacker: Black Hat
Someone who tries to get unauthorized access to a system with the intent to cause mischief, damage, or theft
10
New cards
Hacker: White Hat
Someone who is INVITED to test our computer systems and servers, looking for weaknesses and security needs to be improved to report to the host
11
New cards
Malware
Combo of “malicious” and “software”. A variety of bad software used to infect or damage a system. Ransomware, worms, viruses, and trojans are all examples of malware
12
New cards
Man in the Middle Attack
When a hacker breaks into a Wi-Fi network and steals personal data. (When the “middleman” is the Wi-Fi network)
13
New cards
Phishing
A scam where a hacker poses as a real business or organization (especially credit card companies, charities, internet providers, social media sites, etc.) to get the receiver to give them information
14
New cards
Ransomeware
Malware that hijacks a system and encrypts your files, which in th eprocess denies you access to them until you send them money to unlock everything. (Kidnaps your computer and holds it for ransom)
15
New cards
Spoofing
When a hacker changes the IP address of an email so that it seems as if it’s coming from a trusted source
16
New cards
Spyware
Malware that is used to spy on you and your computer activities. The hacker can see your messages, redirect your phone calls, or even track down your location!
17
New cards
Trojan Horse
Malware that, hence the name, seems like something innocent, but actually lets in a hacker to your computer.
18
New cards
Virus
Malware that changes, corrupts, or destroy information that is passed onto other system. In some means, a virus can cause physical damage.
19
New cards
VPN
Stands for “Virtual Private Network”. that connects computers in a private, encrypted network with each user’s IP address being replaced by the VPN’s IP address. Makes it difficult for hackers to get into your system.
20
New cards
Worm
Malware that can spread to other computers in the network. They can slow down a system, “eat” up resources, or steal data
21
New cards
Cloud
A global network of servers
22
New cards
Software
A group of applications that instruct a computer to carry out a task. The computer reads the program from the storage device and temporarily stores the instructions in a random access memory, or RAM
23
New cards
IP Address
Stands for “Internet Protocol”. It’s a series of numbers that is given to computer router servers, and pretty much anything connected to the Internet (including websites)
24
New cards
Rootkit
Collection of programs or software tools that allow hackers to remotely access and control a computer or network. They don’t directly damage users, but have been used for purposes other than legal ones.
25
New cards
BYOD (Bring your own device)
A company policy that requires its workers to bring their own devices to work.
26
New cards
Pen-testing (Penetration test)
Security evaluation where manual exploitations and other techniques are used by security professionals.
27
New cards
Social Engineering
A method, that is growing in popularity, that gives access to restricted resources. It relies on user manipulation and human psychology.
28
New cards
Clickjacking
When someone is tricked into clicking something on a webpage.
29
New cards
Deepfake
A piece of audio or video that has been changed to make it seem credible. May be used to manipulate society.
30
New cards
MFA (Multi-factor authentication)
AKA “two-factor authentication”; makes it difficult for hackers to access your account by requiring you to provide at least two different credentials
31
New cards
User Authentication
A technique used to prevent unauthorized users from accessing sensitive data
32
New cards
Antivirus
Virus detecting technology that shields users against viruses, spyware, trojans, and worms through email or web browsing
33
New cards
IoT (Internet of Things)
Commonplace items that are connected to the internet and are capable of autonomously collecting and transferring data without requiring human input. Anything that can be given an IP Adress that can transport data is part of the Internet of Things
34
New cards
Network
Two or more computers that are connected together to share resources (like printers and CDs), exchange files, or enable electronic communications make up a network
35
New cards
Cyber Attack
An attempt to beach a logical environment’s security boundry.
36
New cards
Ethical Hacking
Legal; breaking the rules of someone’s network to get sensitive information
37
New cards
Cyber Attack
An attempt to break into a security boundary