Cybersecurity Midterm Vocabulary

5.0(1)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Digital Footprint

The trail that you leave behind when you engage in online experiences.

2
New cards

Virtual Machine

An emulation of a computer system.

3
New cards

Brute Force Attack

An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct.

4
New cards

Dictionary Attack

A systematic attempt to crack a password testing with words and phrases found in online dictionaries.

5
New cards

Encryption

A process that converts human-readable text or data into a coded from.

6
New cards

Algorithm

A set of steps to accomplish a task.

7
New cards

File Extension

The part of the filename that comes after the period, indicating the file type.

8
New cards

Social Media

Websites and applications used for communication by large groups of people, enabling them to share information.

9
New cards

Spam

Irrelevant or inappropriate messaging sent through email to a large number of recipients.

10
New cards

Phishing

Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.

11
New cards

Top-level domain

The last segment of a web address; it follows immediately after the last "dot" symbol (.com, .net, .org, .gov)

12
New cards

Malware

Software that is intended to do harm or damage.

13
New cards

Social Engineering

A broad category for techniques that aim to psychologically manipulate a person's trust to gain access to data or computing resources, usually by being tricked into clicking on a link, opening a file, or answering a question.

14
New cards

Network Topology

The arrangement of the various elements (computers, routers, switches, etc) of a network.

15
New cards

Vulnerability

A weakness in a system that allows an attacker to gain unauthorized access.

16
New cards

Adware

Advertising software that can automatically download files or link to websites

17
New cards

Pop-up

A new dialog box that appears on your screen, sometimes without you requesting it.

18
New cards

Operating System

Software that supports a computer's basic functioning.

19
New cards

Firewall

Software that can stop malware from entering a network, computer, or device.

20
New cards

Server

A computer shared by multiple users across a network. It usually contains resources such as files, computer applications, or large databases.

21
New cards

Router

A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.

22
New cards

Port

A way for a computer to identify specific programs and manage their activity. In an IP addresses, it appears after a colon at the end of the address such as :21, :80, and :443.

23
New cards

Web Server

A computer that delivers files forming web pages across a network to requesting clients.

24
New cards

HTTP

The rules of communication that web sites use to exchange data.

25
New cards

Log file

A file that contains an official record of activities that occur on a computer.

26
New cards

Antivirus

Software that runs on your computer, looking for many different types of malware from many different sources.

27
New cards

Zip file

A file that contains a collection of other files.

28
New cards

Wildcard

A special character that can represent one or more characters. The asterisk (*) can stand from many letters, numbers, or symbols.

29
New cards

RAM

Random Access Memory

30
New cards

URL

Uniform Resource Locator - The systematic way to find specific web addresses and web pages.

31
New cards

Site certificate

It allows an organization to have a secure website.

32
New cards

Domain name

Typically, the last two elements of a URL.

33
New cards

IP Address

An identifying number for hosts and servers on the internet.

34
New cards

DDoS Attack

A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.

35
New cards

Packet

Small units of data, transmitted on a network.

36
New cards

Penetration Test

Performing a computer attack to evaluate the security of a system.

37
New cards

Forceful browsing

When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a web site .

38
New cards

Host

A computer, typically one on a network. A host can also be referred to as a machine or a system.

39
New cards

Attack Surface

The sum of all the vulnerabilities that allow unauthenticated users to attack a network.

40
New cards

Client

The device that is requesting information or services from a server on a network.

41
New cards

Cross-site scripting

A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.

42
New cards

Linux

An operating system similar in concept to the Windows OS but used more often to host routers and web servers.

43
New cards

Packet sniffing

Refers to the action of watching and analyzing network traffic at the packet level.

44
New cards

MAC Address

Unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices.

45
New cards

File system

A collection of files on a computer, logically grouped together.

46
New cards

Access Control

The selective process of allowing or restricting the availability of a resource.

47
New cards

ASCII

A standard that computers use to represent letters , numbers, and symbols.

48
New cards

Open source

Describes software that is is freely available to anyone who wants to use it. Users can modify it and distribute it however they want.

49
New cards

Shell

A program that allows a user to enter commands to interact with an operating system.

50
New cards

Pipe

In UNIX, indicated by a vertical bar | , it connects or redirects output from one command to the input of another.