Cybersecurity Terms and Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary and concepts from the cybersecurity lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

Compliance

Process of adhering to internal standards and external regulations needed to avoid fines and breaches.

2
New cards

Security Frameworks

Guidelines for creating policies and procedures to manage security.

3
New cards

Security Controls

Safeguards or countermeasures put in place to protect information and assets.

4
New cards

Security Posture

An organization's ability to manage defenses of information and assets and reactions; strong posture indicates lower risk.

5
New cards

Phishing

Use of digital communications to trick individuals into revealing sensitive data or deploying malicious software.

6
New cards

Whaling

A type of phishing targeted specifically at a company executive.

7
New cards

Spear Phishing

Targeted phishing aimed at a specific user or group of users.

8
New cards

Vishing

Phishing conducted through electronic voice communication.

9
New cards

Smishing

Phishing conducted through SMS (text messaging).

10
New cards

Address Resolution Protocol (ARP)

A network protocol used to determine the MAC address of the next router or device on the path.

11
New cards

Cloud-based Firewalls

Software firewalls that are hosted by the cloud service provider.

12
New cards

Controlled Zone

A subnet that protects the internal network from the uncontrolled zone.

13
New cards

Domain Name System (DNS)

A networking protocol that translates internet domain names into IP addresses.

14
New cards

Encapsulation

A process performed by a VPN service that protects data by wrapping sensitive information in other data packets.

15
New cards

Firewall

A network security device that monitors traffic to or from your network.

16
New cards

Proxy Server

A server that fulfills the requests of its clients by forwarding them to other servers.

17
New cards

Secure File Transfer Protocol (SFTP)

A secure protocol used to transfer files over a network.

18
New cards

Stateful Firewall

A firewall that keeps track of information passing through it and proactively filters out threats.

19
New cards

Stateless Firewall

A firewall that operates based on predefined rules and does not track information from data packets.

20
New cards

Denial of Service (DoS) Attack

An attack that targets a network or server and floods it with traffic.

21
New cards

Distributed Denial of Service (DDoS) Attack

A type of DoS attack that uses multiple devices to flood a target network with unwanted traffic.

22
New cards

Network Protocols

A set of rules used by two or more devices on a network to describe data delivery and structure.

23
New cards

Penetration Testing (Pen Test)

A simulated attack to identify vulnerabilities in systems, networks, and applications.

24
New cards

Security Hardening

The process of strengthening a system to reduce its vulnerabilities and attack surface.

25
New cards

Active Packet Sniffing

An attack where data packets are manipulated in transit.

26
New cards

Internal Hardware

The components required to run a computer.

27
New cards

Random Access Memory (RAM)

A hardware component used for short-term memory.

28
New cards

Kernel

The component of the Linux OS that manages processes and memory.

29
New cards

World-writable File

A file that can be altered by anyone.

30
New cards

Command-line Interface (CLI)

A text-based user interface that uses commands to interact with the computer.

31
New cards

Graphical User Interface (GUI)

A user interface that uses icons on the screen for interaction.

32
New cards

SQL (Structured Query Language)

A programming language used to create and interact with databases.