Cybersecurity Midterm Vocabulary

studied byStudied by 3 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 49

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

50 Terms

1

Digital Footprint

The trail that you leave behind when you engage in online experiences.

New cards
2

Virtual Machine

An emulation of a computer system.

New cards
3

Brute Force Attack

An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct.

New cards
4

Dictionary Attack

A systematic attempt to crack a password testing with words and phrases found in online dictionaries.

New cards
5

Encryption

A process that converts human-readable text or data into a coded from.

New cards
6

Algorithm

A set of steps to accomplish a task.

New cards
7

File Extension

The part of the filename that comes after the period, indicating the file type.

New cards
8

Social Media

Websites and applications used for communication by large groups of people, enabling them to share information.

New cards
9

Spam

Irrelevant or inappropriate messaging sent through email to a large number of recipients.

New cards
10

Phishing

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.

New cards
11

Top-level domain

The last segment of a web address; it follows immediately after the last "dot" symbol (.com, .net, .org, .gov)

New cards
12

Malware

Software that is intended to do harm or damage.

New cards
13

Social Engineering

A broad category for techniques that aim to psychologically manipulate a person's trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question.

New cards
14

Network Topology

The arrangement of the various elements (computers, routers, switches, etc) of a network.

New cards
15

Vulnerability

A weakness in a system that allows an attacker to gain unauthorized access.

New cards
16

Adware

Advertising software that can automatically download files or link to websites

New cards
17

Pop-up

A new dialog box that appears on your screen, sometimes without you requesting it.

New cards
18

Operating System

Software that supports a computer's basic functioning.

New cards
19

Firewall

Software that can stop malware from entering a network, computer, or device.

New cards
20

Server

A computer shared by multiple users across a network. It usually contains resources such as files, computer applications, or large databases.

New cards
21

Router

A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.

New cards
22

Port

A way for a computer to identify specific programs and manage their activity. In an IP addresses, it appears after a colon at the end of the address such as :21, :80, and :443.

New cards
23

Web Server

A computer that delivers files forming web pages across a network to requesting clients.

New cards
24

HTTP

The rules of communication that web sites use to exchange data.

New cards
25

Log file

A file that contains an official record of activities that occur on a computer.

New cards
26

Antivirus

Software that runs on your computer, looking for many different types of malware from many different sources.

New cards
27

Zip file

A file that contains a collection of other files.

New cards
28

Wildcard

A special character that can represent one or more characters. The asterisk (*) can stand from many letters, numbers, or symbols.

New cards
29

RAM

Random Access Memory

New cards
30

URL

Uniform Resource Locator - The systematic way to find specific web addresses and web pages.

New cards
31

Site certificate

It allows an organization to have a secure website.

New cards
32

Domain name

Typically, the last two elements of a URL.

New cards
33

IP Address

An identifying number for hosts and servers on the internet.

New cards
34

DDoS Attack

A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.

New cards
35

Packet

Small units of data, transmitted on a network.

New cards
36

Penetration Test

Performing a computer attack to evaluate the security of a system.

New cards
37

Forceful browsing

When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a web site .

New cards
38

Host

A computer, typically one on a network. A host can also be referred to as a machine or a system.

New cards
39

Attack Surface

The sum of all the vulnerabilities that allow unauthenticated users to attack a network.

New cards
40

Client

The device that is requesting information or services from a server on a network.

New cards
41

Cross-site scripting

A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.

New cards
42

Linux

An operating system similar in concept to the Windows OS but used more often to host routers and web servers.

New cards
43

Packet sniffing

Refers to the action of watching and analyzing network traffic at the packet level.

New cards
44

MAC Address

Unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices.

New cards
45

File system

A collection of files on a computer, logically grouped together.

New cards
46

Access Control

The selective process of allowing or restricting the availability of a resource.

New cards
47

ASCII

A standard that computers use to represent letters , numbers, and symbols.

New cards
48

Open source

Describes software that is is freely available to anyone who wants to use it. Users can modify it and distribute it however they want.

New cards
49

Shell

A program that allows a user to enter commands to interact with an operating system.

New cards
50

Pipe

In UNIX, indicated by a vertical bar | , it connects or redirects output from one command to the input of another.

New cards

Explore top notes

note Note
studied byStudied by 30 people
769 days ago
5.0(1)
note Note
studied byStudied by 12 people
851 days ago
5.0(1)
note Note
studied byStudied by 5 people
745 days ago
5.0(1)
note Note
studied byStudied by 5 people
156 days ago
5.0(1)
note Note
studied byStudied by 6 people
98 days ago
5.0(1)
note Note
studied byStudied by 25 people
677 days ago
5.0(2)
note Note
studied byStudied by 6493 people
676 days ago
4.6(15)

Explore top flashcards

flashcards Flashcard (32)
studied byStudied by 37 people
64 days ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 6 people
655 days ago
5.0(1)
flashcards Flashcard (44)
studied byStudied by 6 people
328 days ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 111 people
22 days ago
5.0(1)
flashcards Flashcard (66)
studied byStudied by 148 people
372 days ago
5.0(3)
flashcards Flashcard (185)
studied byStudied by 31 people
647 days ago
5.0(2)
flashcards Flashcard (41)
studied byStudied by 8 people
388 days ago
5.0(1)
flashcards Flashcard (87)
studied byStudied by 207 people
71 days ago
5.0(3)
robot