Cybersecurity Fundamentals Lecture (Chapter 1)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key cybersecurity concepts, controls, and technologies from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

CIA Triad

The foundational cybersecurity model emphasizing Confidentiality, Integrity, and Availability.

2
New cards

Confidentiality

Security objective that prevents unauthorized access to sensitive information.

3
New cards

Integrity

Security objective that ensures information or systems are not altered without authorization.

4
New cards

Availability

Security objective that guarantees information and systems are accessible to authorized users when needed.

5
New cards

Privacy

Focuses on how organizations collect, use, and share personal information.

6
New cards

Personally Identifiable Information (PII)

Data that can identify an individual and is protected by regulations and ethical standards.

7
New cards

Generally Accepted Privacy Principles (GAPP)

Ten privacy practices organizations should follow, covering areas such as notice, consent, use, security, and monitoring.

8
New cards

Vulnerability

A weakness in a device, system, application, or process that could be exploited.

9
New cards

Threat

An external force that might exploit a vulnerability.

10
New cards

Risk

The combination of a vulnerability and a corresponding threat.

11
New cards

Adversarial Threat

Deliberate attempts by individuals or groups to undermine an organization’s security.

12
New cards

Accidental Threat

Security issues caused unintentionally by routine user actions.

13
New cards

Structural Threat

Failures of equipment, software, or controls due to resource exhaustion or aging.

14
New cards

Environmental Threat

Natural or human-made disasters outside an organization’s control.

15
New cards

Network Access Control (NAC)

Technology that limits network access to authorized devices and checks they meet security requirements (often via 802.1X).

16
New cards

Agent-Based NAC

NAC method requiring client software on devices for authentication.

17
New cards

Agentless NAC

NAC method using a web browser for authentication, requiring no client software.

18
New cards

In-Band (Inline) NAC

NAC that places dedicated appliances between devices and resources, often using captive portals.

19
New cards

Out-of-Band NAC

NAC leveraging existing infrastructure to authenticate devices and then reconfigure the network for access.

20
New cards

Firewall

Device or software that enforces security rules at a network boundary, typically using access control lists.

21
New cards

Packet-Filtering Firewall

Basic firewall that examines packet headers against predefined rules without state awareness.

22
New cards

Stateful Inspection Firewall

Firewall that keeps track of active connections and makes decisions based on connection state.

23
New cards

Next-Generation Firewall (NGFW)

Advanced firewall that incorporates user, application, and contextual information for deeper inspection.

24
New cards

Web Application Firewall (WAF)

Specialized firewall that protects web applications from attacks like SQL injection and XSS.

25
New cards

Network Segmentation

Isolation of networks with different security levels to create separate zones of trust.

26
New cards

Jump Box

Hardened server that acts as a secure bridge between two networks, accessed via protocols like SSH or RDP.

27
New cards

Honeypot

Decoy system designed to attract attackers and study their methods.

28
New cards

DNS Sinkhole

Service that provides false DNS responses to redirect or disable malicious traffic.

29
New cards

System Hardening

Securing endpoints by disabling unnecessary services and applying secure configurations.

30
New cards

Patch Management

Process of testing and deploying software updates to remediate known vulnerabilities.

31
New cards

Group Policy

Windows feature that applies a defined set of security settings to multiple devices simultaneously.

32
New cards

Endpoint Security Software

Tools such as antivirus and host-based firewalls that protect individual devices from threats.

33
New cards

Mandatory Access Control (MAC)

Strict permission model set by administrators that users cannot alter.

34
New cards

Discretionary Access Control (DAC)

Common permission model where resource owners can modify access rights.

35
New cards

Complementary Controls

Additional safeguards (e.g., segmentation, IDS/IPS) used when patching is not feasible.

36
New cards

Penetration Testing

Simulated attack using real-world techniques to evaluate an organization’s security posture.

37
New cards

NIST Pentesting Phases

Planning, Discovery, Attack, and Reporting—structured steps for penetration tests.

38
New cards

NIST Attack Phase

Sequence of gaining access, escalating privileges, system browsing, and installing additional tools.

39
New cards

Sandboxing

Malware detection technique that observes code behavior in an isolated environment.

40
New cards

Security Orchestration, Automation, and Response (SOAR)

Platforms that automate and coordinate security tasks across multiple systems.

41
New cards

Machine Learning in Security

Use of algorithms to analyze large security datasets and improve threat detection based on experience.

42
New cards

Application Programming Interface (API)

Programmatic interface enabling software to interact with services without a web UI.

43
New cards

Webhook

Mechanism to send real-time data or signals from one application to another via web requests.

44
New cards

Plugin

Small program that extends the functionality of a larger application.