Cybersecurity Glossary

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/511

flashcard set

Earn XP

Description and Tags

A vocabulary list of important cybersecurity terms and definitions to aid in understanding and studying for exams.

Last updated 12:06 PM on 4/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

512 Terms

1
New cards
Terms and definitions from the certificate
2
New cards
A
3
New cards
Absolute file path: The full file path, which starts from the root
4
New cards
Access controls: Security controls that manage access, authorization, and accountability of information
5
New cards
Active packet sniffing: A type of attack where data packets are manipulated in transit
6
New cards
Address Resolution Protocol (ARP): A network protocol used to determine the MAC address of the next router or device on the path
7
New cards
Advanced persistent threat (APT): An instance when a threat actor maintains unauthorized access to a system for an extended period of time
8
New cards
Adversarial artificial intelligence (AI): A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
9
New cards
Adware: A type of legitimate software that is sometimes used to display digital advertisements in applications
10
New cards
Algorithm: A set of rules used to solve a problem
11
New cards
Analysis: The investigation and validation of alerts
12
New cards
Angler phishing: A technique where attackers impersonate customer service representatives on social media
13
New cards
Anomaly-based analysis: A detection method that identifies abnormal behavior
14
New cards
Antivirus software: A software program used to prevent, detect, and eliminate malware and viruses
15
New cards
Application: A program that performs a specific task
16
New cards
Application programming interface (API) token: A small block of encrypted code that contains information about a user
17
New cards
Argument (Linux): Specific information needed by a command
18
New cards
Argument (Python): The data brought into a function when it is called
19
New cards
Array: A data type that stores data in a comma-separated ordered list
20
New cards
Artificial intelligence (AI): Computer programs that can complete cognitive tasks typically associated with human intelligence
21
New cards
AI tool: AI-powered software that can automate or assist users with a variety of tasks
22
New cards
AI user: Someone who leverages AI to complete a personal or professional task
23
New cards
Assess: The fifth step of the NIST RMF that means to determine if established controls are implemented correctly
24
New cards
Asset: An item perceived as having value to an organization
25
New cards
Asset classification: The practice of labeling assets based on sensitivity and importance to an organization
26
New cards
Asset inventory: A catalog of assets that need to be protected
27
New cards
Asset management: The process of tracking assets and the risks that affect them
28
New cards
Asymmetric encryption: The use of a public and private key pair for encryption and decryption of data
29
New cards
Attack surface: All the potential vulnerabilities that a threat actor could exploit
30
New cards
Attack tree: A diagram that maps threats to assets
31
New cards
Attack vectors: The pathways attackers use to penetrate security defenses
32
New cards
Authentication: The process of verifying who someone is
33
New cards
Authorization: The concept of granting access to specific resources in a system
34
New cards
Authorize: The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization
35
New cards
36
New cards
Automation: The use of technology to reduce human and manual effort to perform common and repetitive tasks
37
New cards
Availability: The idea that data is accessible to those who are authorized to access it
38
New cards
B
39
New cards
Baiting: A social engineering tactic that tempts people into compromising their security
40
New cards
Bandwidth: The maximum data transmission capacity over a network, measured by bits per second
41
New cards
Baseline configuration (baseline image): A documented set of specifications within a system that is used as a basis for future builds, releases, and updates
42
New cards
Bash: The default shell in most Linux distributions
43
New cards
Basic auth: The technology used to establish a user’s request to access a server
44
New cards
Basic Input/Output System (BIOS): A microchip that contains loading instructions for the computer and is prevalent in older systems
45
New cards
Behavioral interview: A type of interview designed to understand how you responded in past situations to predict your future performance
46
New cards
Biometrics: The unique physical characteristics that can be used to verify a person’s identity
47
New cards
Bit: The smallest unit of data measurement on a computer
48
New cards
Boolean data: Data that can only be one of two values: either True or False
49
New cards
Bootloader: A software program that boots the operating system
50
New cards
Botnet: A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder"
51
New cards
Bracket notation: The indices placed in square brackets
52
New cards
Broken chain of custody: Inconsistencies in the collection and logging of evidence in the chain of custody
53
New cards
Brute force attack: The trial and error process of discovering private information
54
New cards
Bug bounty: Programs that encourage freelance hackers to find and report vulnerabilities
55
New cards
Built-in function: A function that exists within Python and can be called directly
56
New cards
Business continuity: An organization's ability to maintain their everyday productivity by establishing risk disaster recovery plans
57
New cards
58
New cards
Business continuity plan (BCP): A document that outlines the procedures to sustain business operations during and after a significant disruption
59
New cards
Business Email Compromise (BEC): A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage
60
New cards
C
61
New cards
Career Dreamer: An experimental tool that uses AI to make career exploration easier and more personalized
62
New cards
63
New cards
Career identity statement: A few sentences about yourself that provide a quick but insightful overview of your key skills, interests, career goals, and what you're passionate about
64
New cards
65
New cards
Case interview: An interview type designed to evaluate your problem-solving, analytical, and communication skills by presenting you with real-world business challenges to analyze and solve
66
New cards
67
New cards
Categorize: The second step of the NIST RMF that is used to develop risk management processes and tasks
68
New cards
69
New cards
CentOS: An open-source distribution that is closely related to Red Hat
70
New cards
Central Processing Unit (CPU): A computer’s main processor, which is used to perform general computing tasks on a computer
71
New cards
Chain of custody: The process of documenting evidence possession and control during an incident lifecycle
72
New cards
Chat: An input box in an AI tool where you can add prompts
73
New cards
Chronicle (Google SecOps): A cloud-native tool designed to retain, analyze, and search data
74
New cards
Cipher: An algorithm that encrypts information
75
New cards
Cloud-based firewalls: Software firewalls that are hosted by the cloud service provider
76
New cards
Cloud computing: The practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices
77
New cards
Cloud network: A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet
78
New cards
Cloud security: The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users
79
New cards
Command: An instruction telling the computer to do something
80
New cards
Command and control (C2): The techniques used by malicious actors to maintain communications with compromised systems
81
New cards
Command-line interface (CLI): A text-based user interface that uses commands to interact with the computer
82
New cards
Comment: A note programmers make about the intention behind their code
83
New cards
Common Event Format (CEF): A log format that uses key-value pairs to structure data and identify fields and their corresponding values
84
New cards
Common Vulnerabilities and Exposures (CVE®) list: An openly accessible dictionary of known vulnerabilities and exposures
85
New cards
Common Vulnerability Scoring System (CVSS): A measurement system that scores the severity of a vulnerability
86
New cards
Compliance: The process of adhering to internal standards and external regulations
87
New cards
Computer security incident response teams (CSIRT): A specialized group of security professionals that are trained in incident management and response
88
New cards
Computer virus: Malicious code written to interfere with computer operations and cause damage to data and software
89
New cards
Conditional statement: A statement that evaluates code to determine if it meets a specified set of conditions
90
New cards
Confidential data: Data that often has limits on the number of people who have access to it
91
New cards
Confidentiality: The idea that only authorized users can access specific assets or data
92
New cards
Confidentiality, integrity, availability (CIA) triad: A model that helps inform how organizations consider risk when setting up systems and security policies
93
New cards
Configuration file: A file used to configure the settings of an application
94
New cards
Containment: The act of limiting and preventing additional damage caused by an incident
95
New cards
Controlled zone: A subnet that protects the internal network from the uncontrolled zone
96
New cards
Cover letter: A personalized document that showcases your communication skills and personality while demonstrating how your skills and experience align with the employer's needs
97
New cards
Cross-site scripting (XSS): An injection attack that inserts code into a vulnerable website or web application
98
New cards
Crowdsourcing: The practice of gathering information using public input and collaboration
99
New cards
Cryptographic attack: An attack that affects secure forms of communication between a sender and intended recipient
100
New cards
Cryptographic key: A mechanism that decrypts ciphertext