1/16
These flashcards cover essential vocabulary and definitions related to basic cybersecurity concepts.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Confidentiality
Prevents unauthorized disclosure of information.
Integrity
Assures that data cannot be modified in an unauthorized manner.
Availability
Information should be readily available for authorized users.
Access Control
Defines rules and policies for limiting access to a system or to physical or virtual resources.
Authentication
Confirms a user's identity or role before granting access.
Authorization
A security mechanism that gives permission to access resources based on an access control policy.
Physical Security
Measures designed to deny unauthorized access to IT assets.
Malware
Unwanted software installed on a system without consent.
Phishing
An attack that involves sending emails that appear to be from trusted sources to gain personal information.
Ransomware
A type of malware that blocks access to the victim’s data and demands a ransom to unlock it.
Denial-of-Service (DoS) Attack
An attack that overwhelms a system’s resources, preventing it from responding to service requests.
Man-in-the-Middle (MitM) Attack
Occurs when a hacker inserts itself between the communications of a client and a server.
SQL Injection
A web security vulnerability that allows an attacker to interfere with the queries made to a database.
Buffer Overflow
Occurs when the volume of data exceeds the storage capacity of a memory buffer, overwriting adjacent memory locations.
Two-Factor Authentication
A security process in which the user provides two different authentication factors to verify themselves.
Blended Attacks
Attacks that use multiple techniques to compromise a target.
Security Incident and Event Management (SIEM)
A process for managing security incidents and events to minimize their impact.