1/23
Flashcards based on cybersecurity lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Threat
A potential danger that could exploit a vulnerability.
Vulnerability
A weakness in a system that can be exploited.
Attack
The action taken to exploit a vulnerability.
Malware
Viruses, Trojans, worms, and other malicious software.
Phishing
Social engineering attacks to steal sensitive information.
Ransomware
Encrypting files and demanding ransom for their release.
Denial of Service (DoS)
Overloading a system to make it unavailable.
Man-in-the-Middle Attack
Intercepting communication between two parties.
Confidentiality
Ensuring that only authorized individuals have access to information.
Integrity
Ensuring that information remains unchanged and accurate.
Availability
Ensuring that information is accessible when needed.
Threat Modeling
A structured process to identify security threats.
Attack Vectors
Ways in which cyber threats can exploit system weaknesses.
Security Testing
The process to identify weaknesses in software, networks, and devices to ensure protection against cyber threats.
Vulnerability Assessment
Uses automated tools to scan for known weaknesses.
Penetration Testing
Ethical hackers simulate real-world attacks to find vulnerabilities.
Security Audits
Reviews policies, procedures, and controls to ensure security.
Risk Assessment
Identifies critical assets and threats to prioritize security measures.
Emergent Risk
Risks that develop over time as systems interact, grow, and evolve.
Complex Risk
Risks that come from multiple, intertwined factors including human behavior and technology.
Logical Malleability
The ability to modify software/hardware logic beyond the original design.
Decentralized System
A system where control is distributed across many devices or nodes, with no single central controller.
Dynamic System
A system that is always evolving where Devices connect and disconnect, software updates happen, and users come and go.
Unknown Component Risk
Hidden interactions can cause failures, sometimes not all parts of a system are known or properly documented.