Chapter 1: Introduction to the Management of Cybersecurity Key terms

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/119

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

120 Terms

1
New cards

Asset

An organizational resource that is being protected. An asset can be logical, such as a website, software information, or data, or it can be physical, such as a person, computer system, hardware, or other tangible object. Assets, particularly information assets, are the focus of what security efforts are attempting to protect.

2
New cards

Information assets

The focus of cybersecurity; information that has value to the organization, and the systems that store, process, and transmit the information.

3
New cards

Security

The state of being secure and free from danger or harm, or the actions taken to make someone or something secure.

4
New cards

Cybersecurity

The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology. Cybersecurity overlaps with all other security areas.

5
New cards

Computer security

The protection of computerized information processing systems and the data they contain and process.

6
New cards

Communications security

The protection of all communications media, technology, and content.

7
New cards

Network security

A subset of communications security; the protection of voice and data networking components, connections, and content.

8
New cards

Operations security

The protection of the details of an organization’s operations and activities.

9
New cards

Physical security

The protection of physical items, objects, or areas from unauthorized access and misuse; known in industry as corporate security.

10
New cards

Confidentiality

An attribute of information that describes how data is protected from disclosure or exposure to unauthorized individuals or systems. It requires limiting access to information only to those who need it and preventing access by those who do not.

11
New cards

Disclosure

The intentional or unintentional exposure of an information asset to unauthorized parties.

12
New cards

Possession

An attribute of information that describes how the data’s ownership or control is legitimate or authorized.

13
New cards

Integrity

An attribute of information that describes how data is whole, complete, and uncorrupted.

14
New cards

Noise

Additional, disruptive signals in network communications or electrical power delivery.

15
New cards

Availability

The attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction.

16
New cards

Privacy

The right of individuals or groups to protect themselves and their information from unauthorized access, providing confidentiality.

17
New cards

Information aggregation

The collection and combination of pieces of nonprivate data, possibly resulting in information that violates privacy.

18
New cards

Identification

The access control mechanism whereby unverified entities who seek access to a resource provide a credential by which they are known to the system.

19
New cards

IAAA security framework

An architectural framework that is used to allow access to computer resources, enforce policies, and facilitate audits. It ensures network and computer management and security.

20
New cards

Authentication

The access control mechanism that requires the validation and verification of an entity’s asserted identity.

21
New cards

Authorization

The access control mechanism that matches an authenticated entity to its permitted information assets and corresponding access levels.

22
New cards

Accountability

The access control mechanism that ensures all actions on a system, authorized or unauthorized, can be attributed to an authenticated identity.

23
New cards

Threat

Any event or circumstance that has the potential to adversely affect operations and assets.

24
New cards

Attack

An intentional or unintentional act that can damage or compromise information and systems. Also known as a threat event.

25
New cards

Threat event

An intentional or unintentional act that can damage or compromise information and systems. Also known as an attack.

26
New cards

Threat agent

A specific instance or component of a threat. Also known as a threat source.

27
New cards

Threat source

A specific instance or component of a threat. Also known as a threat agent.

28
New cards

Exploit

A technique used to compromise a system.

29
New cards

Vulnerability

A potential weakness in an asset or its defensive controls.

30
New cards

Availability disruption

An interruption in services that causes an adverse event within the organization.

31
New cards

Service level agreement (SLA)

A document that specifies the expected level of service from a service provider, usually defining minimum acceptable availability and penalties for downtime.

32
New cards

Blackout

A long-term interruption (outage) in electrical power availability.

33
New cards

Brownout

A long-term decrease in the quality of electrical power availability.

34
New cards

Fault

A short-term interruption in electrical power availability.

35
New cards

Sag

A short-term decrease in electrical power availability.

36
New cards

Spike

A short-term increase in electrical power availability; also called a swell.

37
New cards

Swell

A short-term increase in electrical power availability; also called a spike.

38
New cards

Surge

A long-term increase in electrical power availability.

39
New cards

Competitive intelligence

The legal collection and analysis of business competitor information to gain competitive advantage.

40
New cards

Industrial espionage

The illegal collection and analysis of competitor information to gain unfair advantage.

41
New cards

Shoulder surfing

The direct, covert observation of individual information or system use.

42
New cards

Trespass

The unauthorized entry into the real or virtual property of another party.

43
New cards

Hacker

A person who accesses systems and information without authorization, often illegally.

44
New cards

Expert hacker

A hacker with extensive knowledge of hardware and software inner workings; also called elite hacker.

45
New cards

Elite hackers

Hackers with extensive knowledge of computer hardware and software who gain unauthorized access; also known as expert hackers.

46
New cards

Professional hacker

A hacker who conducts attacks for personal gain, organized crime, or a foreign government.

47
New cards

Penetration tester

An authorized cybersecurity professional who tests systems to identify vulnerabilities.

48
New cards

Advanced persistent threat (APT)

A collection of coordinated processes, usually directed by humans, that target specific organizations or individuals.

49
New cards

Novice hacker

A relatively unskilled hacker who uses others’ tools to perform attacks.

50
New cards

Script kiddie

A novice hacker who uses software or scripts written by experts to attack systems.

51
New cards

Packet monkeys

Novice hackers using automated exploits to perform denial-of-service attacks.

52
New cards

Privilege escalation

The unauthorized elevation of user permissions to gain control over system resources.

53
New cards

Jailbreaking

Elevating privileges to gain administrative control over a smartphone OS.

54
New cards

Rooting

Elevating privileges to gain administrative control over a computer system.

55
New cards

Cracker

A hacker who removes or bypasses software copyright protection.

56
New cards

Cracking

Attempting to reverse-engineer or bypass access controls such as passwords or DRM.

57
New cards

Brute-force password attack

An effort to guess passwords by trying all possible combinations.

58
New cards

Dictionary password attack

A brute-force variant that narrows guesses using lists of common passwords or personal info.

59
New cards

Dictionary attack

Same as dictionary password attack; uses a dictionary of possible passwords.

60
New cards

Rainbow table

A database mapping hashed values to plaintext passwords for quick lookups.

61
New cards

Social engineering

Using deception and social skills to trick people into revealing confidential information.

62
New cards

Advance-fee fraud (AFF)

A scam promising a large sum of money for a small upfront fee; also called 4-1-9 fraud.

63
New cards

4-1-9 fraud

A scam promising a large sum of money for a small upfront fee; also called advance-fee fraud.

64
New cards

Phishing

A fraudulent communication disguised as legitimate to extract personal or confidential data.

65
New cards

Spear phishing

A highly targeted phishing attack on a specific person or group.

66
New cards

Pretexting

When an attacker pretends to be an authority to trick victims into revealing information.

67
New cards

Business email compromise (BEC)

A phishing-style attack impersonating executives to manipulate employees.

68
New cards

Information extortion

Theft of confidential data followed by ransom demands to prevent disclosure.

69
New cards

Ransomware

Malware that encrypts valuable data and demands payment for decryption.

70
New cards

Intellectual property (IP)

The ownership and control of original ideas or creative works.

71
New cards

Software piracy

The unauthorized duplication or distribution of copyrighted software.

72
New cards

Hacktivists

Attackers disrupting systems to protest organizations or governments; also called cyberactivists.

73
New cards

Cyberactivists

Attackers disrupting systems for political or social causes; also called hacktivists.

74
New cards

Cyberterrorism

Carrying out terrorist activities online.

75
New cards

Cyberwarfare

State-sanctioned cyber operations between nations.

76
New cards

Information warfare

State-sponsored offensive cyber operations; synonymous with cyberwarfare.

77
New cards

Tactics, techniques, and procedures (TTP)

The structured behaviors of attackers, from high-level tactics to detailed procedures.

78
New cards

Malware

Malicious or unwanted software code designed to harm systems.

79
New cards

Malicious code

Software written to perform harmful or unauthorized actions; synonymous with malware.

80
New cards

Malicious software

Software written to perform harmful or unauthorized actions; synonymous with malicious code.

81
New cards

Virus

Malware attached to other executable programs.

82
New cards

Macro virus

A virus written in a macro language targeting specific applications.

83
New cards

Boot virus

A virus that infects the boot sector or MBR of storage media.

84
New cards

Boot-sector virus

A virus that infects the boot sector or MBR; same as boot virus.

85
New cards

Worms

Malware capable of self-replication without attaching to other programs.

86
New cards

Trojan horses

Malware disguised as legitimate software that activates its true behavior when run.

87
New cards

Polymorphic threats

Malware that changes its appearance to evade antivirus detection.

88
New cards

Back door

Malware providing access to a system by bypassing normal controls; also called trap door or maintenance hook.

89
New cards

Trap door

A malware access method bypassing controls; also called back door or maintenance hook.

90
New cards

Maintenance hooks

Malware features that bypass controls for access; also called back doors or trap doors.

91
New cards

Denial-of-service (DoS) attack

An attack that overwhelms a target’s capacity, blocking legitimate access.

92
New cards

Distributed denial-of-service (DDoS) attack

A coordinated DoS attack from many compromised systems.

93
New cards

Bots

Automated programs remotely controlled to perform attacks; also called zombies.

94
New cards

Zombie

Automated program remotely commanded to perform attacks; also called bot.

95
New cards

Spam

Unsolicited bulk commercial email.

96
New cards

Clickbait

Content crafted to lure clicks, often installing malware or generating ad revenue.

97
New cards

Mail bomb

An attack that floods a recipient’s inbox with excessive email.

98
New cards

Packet sniffer

Software or hardware that intercepts and analyzes network traffic; also called network sniffer.

99
New cards

Network sniffer

Software or hardware that intercepts and analyzes network traffic; also called packet sniffer.

100
New cards

IP spoofing

Using forged IP addresses to impersonate trusted sources.