IT Security Vocabulary

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards covering key concepts in IT security, aimed at helping students understand and remember essential terms.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Remediation

The process of taking corrective actions to permanently fix or eliminate identified vulnerabilities, threats, or security weaknesses.

2
New cards

Technology Governance

A framework of policies, processes, and structures that directs and controls how an organization's IT resources align with business goals, manage risks, deliver value, and ensure compliance.

3
New cards

Threshold

A predefined level, value, or limit that, when crossed, triggers an alert, action, or escalation, acting as a decision point to manage risk, detect anomalies, or enforce policies.

4
New cards

False Positive

An alert or alarm that occurs in the absence of an actual attack.

5
New cards

Projectitis

A phenomenon where a project manager or team focuses excessively on the mechanics of project management at the expense of meaningful work.

6
New cards

External Monitoring

The continuous process of discovering, cataloging, and assessing an organization's internet-facing assets from an attacker's perspective.

7
New cards

False Negative

Failure of a technical control to react to an actual attack event.

8
New cards

Methodology

Systematic framework of strategies, processes, and standards used to protect digital and physical information assets.

9
New cards

Inline Sensor

An IDPS sensor intended for network perimeter use and deployed in close proximity to a perimeter firewall.

10
New cards

Change Control

Ensures that the working system delivered to users represents the intent of the developers.

11
New cards

Trust Model Pinning

A security technique that hardens trust in digital certificates by associating a specific host with a predetermined certificate or public key.

12
New cards

Internal Monitoring

The continuous observation and assessment of activities within an organization's network and systems to detect threats, vulnerabilities, and policy violations.

13
New cards

Passive Sensor

A sensor that only monitors and analyzes observed networks and system traffic.

14
New cards

Difference Analysis

A procedure that compares the current state of a network segment against a known previous state of the same network segment.

15
New cards

Block Cipher

An encryption method that involves dividing the plaintext into blocks and then converting the plaintext to ciphertext one block at a time.

16
New cards

Gap Analysis

The process of comparing measured results against expected results and using the resulting 'gap' as a measure of project success.

17
New cards

Steganography

The cryptographic technique that allows the embedding of data bits in a digital version of graphical images, enabling a user to hide a message in a picture.

18
New cards

Metrics

To measure incident response, capability, and its effectiveness.