Basic Cybersecurity Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

These flashcards cover essential vocabulary and definitions related to basic cybersecurity concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Confidentiality

Prevents unauthorized disclosure of information.

2
New cards

Integrity

Assures that data cannot be modified in an unauthorized manner.

3
New cards

Availability

Information should be readily available for authorized users.

4
New cards

Access Control

Defines rules and policies for limiting access to a system or to physical or virtual resources.

5
New cards

Authentication

Confirms a user's identity or role before granting access.

6
New cards

Authorization

A security mechanism that gives permission to access resources based on an access control policy.

7
New cards

Physical Security

Measures designed to deny unauthorized access to IT assets.

8
New cards

Malware

Unwanted software installed on a system without consent.

9
New cards

Phishing

An attack that involves sending emails that appear to be from trusted sources to gain personal information.

10
New cards

Ransomware

A type of malware that blocks access to the victim’s data and demands a ransom to unlock it.

11
New cards

Denial-of-Service (DoS) Attack

An attack that overwhelms a system’s resources, preventing it from responding to service requests.

12
New cards

Man-in-the-Middle (MitM) Attack

Occurs when a hacker inserts itself between the communications of a client and a server.

13
New cards

SQL Injection

A web security vulnerability that allows an attacker to interfere with the queries made to a database.

14
New cards

Buffer Overflow

Occurs when the volume of data exceeds the storage capacity of a memory buffer, overwriting adjacent memory locations.

15
New cards

Two-Factor Authentication

A security process in which the user provides two different authentication factors to verify themselves.

16
New cards

Blended Attacks

Attacks that use multiple techniques to compromise a target.

17
New cards

Security Incident and Event Management (SIEM)

A process for managing security incidents and events to minimize their impact.