Cybersecurity Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

Flashcards based on cybersecurity lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Threat

A potential danger that could exploit a vulnerability.

2
New cards

Vulnerability

A weakness in a system that can be exploited.

3
New cards

Attack

The action taken to exploit a vulnerability.

4
New cards

Malware

Viruses, Trojans, worms, and other malicious software.

5
New cards

Phishing

Social engineering attacks to steal sensitive information.

6
New cards

Ransomware

Encrypting files and demanding ransom for their release.

7
New cards

Denial of Service (DoS)

Overloading a system to make it unavailable.

8
New cards

Man-in-the-Middle Attack

Intercepting communication between two parties.

9
New cards

Confidentiality

Ensuring that only authorized individuals have access to information.

10
New cards

Integrity

Ensuring that information remains unchanged and accurate.

11
New cards

Availability

Ensuring that information is accessible when needed.

12
New cards

Threat Modeling

A structured process to identify security threats.

13
New cards

Attack Vectors

Ways in which cyber threats can exploit system weaknesses.

14
New cards

Security Testing

The process to identify weaknesses in software, networks, and devices to ensure protection against cyber threats.

15
New cards

Vulnerability Assessment

Uses automated tools to scan for known weaknesses.

16
New cards

Penetration Testing

Ethical hackers simulate real-world attacks to find vulnerabilities.

17
New cards

Security Audits

Reviews policies, procedures, and controls to ensure security.

18
New cards

Risk Assessment

Identifies critical assets and threats to prioritize security measures.

19
New cards

Emergent Risk

Risks that develop over time as systems interact, grow, and evolve.

20
New cards

Complex Risk

Risks that come from multiple, intertwined factors including human behavior and technology.

21
New cards

Logical Malleability

The ability to modify software/hardware logic beyond the original design.

22
New cards

Decentralized System

A system where control is distributed across many devices or nodes, with no single central controller.

23
New cards

Dynamic System

A system that is always evolving where Devices connect and disconnect, software updates happen, and users come and go.

24
New cards

Unknown Component Risk

Hidden interactions can cause failures, sometimes not all parts of a system are known or properly documented.