Basic Cybersecurity Concepts

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

These flashcards cover essential vocabulary and definitions related to basic cybersecurity concepts.

Last updated 9:22 PM on 4/27/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

17 Terms

1
New cards

Confidentiality

Prevents unauthorized disclosure of information.

2
New cards

Integrity

Assures that data cannot be modified in an unauthorized manner.

3
New cards

Availability

Information should be readily available for authorized users.

4
New cards

Access Control

Defines rules and policies for limiting access to a system or to physical or virtual resources.

5
New cards

Authentication

Confirms a user's identity or role before granting access.

6
New cards

Authorization

A security mechanism that gives permission to access resources based on an access control policy.

7
New cards

Physical Security

Measures designed to deny unauthorized access to IT assets.

8
New cards

Malware

Unwanted software installed on a system without consent.

9
New cards

Phishing

An attack that involves sending emails that appear to be from trusted sources to gain personal information.

10
New cards

Ransomware

A type of malware that blocks access to the victim’s data and demands a ransom to unlock it.

11
New cards

Denial-of-Service (DoS) Attack

An attack that overwhelms a system’s resources, preventing it from responding to service requests.

12
New cards

Man-in-the-Middle (MitM) Attack

Occurs when a hacker inserts itself between the communications of a client and a server.

13
New cards

SQL Injection

A web security vulnerability that allows an attacker to interfere with the queries made to a database.

14
New cards

Buffer Overflow

Occurs when the volume of data exceeds the storage capacity of a memory buffer, overwriting adjacent memory locations.

15
New cards

Two-Factor Authentication

A security process in which the user provides two different authentication factors to verify themselves.

16
New cards

Blended Attacks

Attacks that use multiple techniques to compromise a target.

17
New cards

Security Incident and Event Management (SIEM)

A process for managing security incidents and events to minimize their impact.