Glossary Terms From Module 2

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:09 AM on 9/11/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

What is adversarial artificial intelligence (AI)?

A technique that manipulates AI and machine learning technology to conduct attacks more efficiently.

2
New cards

What does BEC stand for and what does it refer to?

Business Email Compromise; a type of phishing attack where a threat actor impersonates a known source to obtain financial advantage.

3
New cards

What is CISSP?

Certified Information Systems Security Professional; a globally recognized information security certification awarded by the International Information Systems Security Certification Consortium.

4
New cards

What is the definition of a computer virus?

Malicious code written to interfere with computer operations and cause damage to data and software.

5
New cards

What is a cryptographic attack?

An attack that affects secure forms of communication between a sender and intended recipient.

6
New cards

Who is considered a hacker?

Any person who uses computers to gain access to computer systems, networks, or data.

7
New cards

What is malware?

Software designed to harm devices or networks.

8
New cards

What is a password attack?

An attempt to access password secured devices, systems, networks, or data.

9
New cards

Define phishing.

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

10
New cards

What is a physical attack?

A security incident that affects both digital and physical environments where the incident is deployed.

11
New cards

What is physical social engineering?

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.

12
New cards

What does social engineering refer to?

A manipulation technique that exploits human error to gain private information, access, or valuables.

13
New cards

What is social media phishing?

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack.

14
New cards

What is spear phishing?

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source.

15
New cards

Define a supply-chain attack.

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.

16
New cards

What is USB baiting?

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network.

17
New cards

What does vishing involve?

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

18
New cards

Define a watering hole attack.

A type of attack when a threat actor compromises a website frequently visited by a specific group of users.

Explore top flashcards

Thứ 2: 1 -150
Updated 265d ago
flashcards Flashcards (150)
Cell theory
Updated 1113d ago
flashcards Flashcards (27)
Anatomy Exam 1
Updated 1116d ago
flashcards Flashcards (97)
Meiosis Vocab
Updated 1015d ago
flashcards Flashcards (24)
Giddes APUSH Unit 2
Updated 843d ago
flashcards Flashcards (46)
EDU
Updated 317d ago
flashcards Flashcards (70)
Thứ 2: 1 -150
Updated 265d ago
flashcards Flashcards (150)
Cell theory
Updated 1113d ago
flashcards Flashcards (27)
Anatomy Exam 1
Updated 1116d ago
flashcards Flashcards (97)
Meiosis Vocab
Updated 1015d ago
flashcards Flashcards (24)
Giddes APUSH Unit 2
Updated 843d ago
flashcards Flashcards (46)
EDU
Updated 317d ago
flashcards Flashcards (70)