Overall

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/417

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

418 Terms

1
New cards

Access controls

Security controls that manage access, authorization, and accountability of information

2
New cards

Active packet sniffing

A type of attack where data packets are manipulated in transit

3
New cards

Address Resolution Protocol (ARP)

A network protocol used to determine the MAC address of the next router or device on the path

4
New cards

Advanced persistent threat (APT)

An instance when a threat actor maintains unauthorized access to a system for an extended period of time

5
New cards

Adversarial artificial intelligence (AI)

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

6
New cards

Adware

A type of legitimate software that is sometimes used to display digital advertisements in applications

7
New cards

Algorithm

A set of rules used to solve a problem

8
New cards

Analysis

The investigation and validation of alerts

9
New cards

Angler phishing

A technique where attackers impersonate customer service representatives on social media

10
New cards

Anomaly-based analysis

A detection method that identifies abnormal behavior

11
New cards

Antivirus software

A software program used to prevent, detect, and eliminate malware and viruses

12
New cards

Application

A program that performs a specific task

13
New cards

Application programming interface (API) token

A small block of encrypted code that contains information about a user

14
New cards

Argument (Linux)

Specific information needed by a command

15
New cards

Argument (Python)

The data brought into a function when it is called

16
New cards

Array

A data type that stores data in a comma-separated ordered list

17
New cards

Assess

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly

18
New cards

Asset

An item perceived as having value to an organization

19
New cards

Asset classification

The practice of labeling assets based on sensitivity and importance to an organization

20
New cards

Asset inventory

A catalog of assets that need to be protected

21
New cards

Asset management

The process of tracking assets and the risks that affect them

22
New cards

Asymmetric encryption

The use of a public and private key pair for encryption and decryption of data

23
New cards

Attack surface

All the potential vulnerabilities that a threat actor could exploit

24
New cards

Attack tree

A diagram that maps threats to assets

25
New cards

Attack vectors

The pathways attackers use to penetrate security defenses

26
New cards

Authentication

The process of verifying who someone is

27
New cards

Authorization

The concept of granting access to specific resources in a system

28
New cards

Authorize

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization

29
New cards

Automation

The use of technology to reduce human and manual effort to perform common and repetitive tasks

30
New cards

Availability

The idea that data is accessible to those who are authorized to access it

31
New cards

Baiting

A social engineering tactic that tempts people into compromising their security

32
New cards

Bandwidth

The maximum data transmission capacity over a network, measured by bits per second

33
New cards

Baseline configuration (baseline image)

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

34
New cards

Bash

The default shell in most Linux distributions

35
New cards

Basic auth

The technology used to establish a user’s request to access a server

36
New cards

Basic Input/Output System (BIOS)

A microchip that contains loading instructions for the computer and is prevalent in older systems

37
New cards

Biometrics

The unique physical characteristics that can be used to verify a person’s identity

38
New cards

Bit

The smallest unit of data measurement on a computer

39
New cards

Boolean data

Data that can only be one of two values: either True or False

40
New cards

Bootloader

A software program that boots the operating system

41
New cards

Botnet

A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder"

42
New cards

Bracket notation

The indices placed in square brackets

43
New cards

Broken chain of custody

Inconsistencies in the collection and logging of evidence in the chain of custody

44
New cards

Brute force attack

The trial and error process of discovering private information

45
New cards

Bug bounty

Programs that encourage freelance hackers to find and report vulnerabilities

46
New cards

Built-in function

A function that exists within Python and can be called directly

47
New cards

Business continuity

An organization's ability to maintain their everyday productivity by establishing risk disaster recovery plans

48
New cards

Business continuity plan (BCP)

A document that outlines the procedures to sustain business operations during and after a significant disruption

49
New cards

Business Email Compromise (BEC)

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

50
New cards

Categorize

The second step of the NIST RMF that is used to develop risk management processes and tasks

51
New cards

Central Processing Unit (CPU)

A computer’s main processor, which is used to perform general computing tasks on a computer

52
New cards

Chain of custody

The process of documenting evidence possession and control during an incident lifecycle

53
New cards

Cipher

An algorithm that encrypts information

54
New cards

Cloud-based firewalls

Software firewalls that are hosted by the cloud service provider

55
New cards

Cloud computing

The practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices

56
New cards

Cloud network

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

57
New cards

Cloud security

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

58
New cards

Command

An instruction telling the computer to do something

59
New cards

Command and control (C2)

The techniques used by malicious actors to maintain communications with compromised systems

60
New cards

Command-line interface (CLI)

A text-based user interface that uses commands to interact with the computer

61
New cards

Comment

A note programmers make about the intention behind their code

62
New cards

Common Event Format (CEF

A log format that uses key-value pairs to structure data and identify fields and their corresponding values

63
New cards

Common Vulnerabilities and Exposures (CVE®) list

An openly accessible dictionary of known vulnerabilities and exposures

64
New cards

Common Vulnerability Scoring System (CVSS)

A measurement system that scores the severity of a vulnerability

65
New cards

Compliance

The process of adhering to internal standards and external regulations

66
New cards

Computer security incident response teams (CSIRT)

A specialized group of security professionals that are trained in incident management and response

67
New cards

Computer virus

Malicious code written to interfere with computer operations and cause damage to data and software

68
New cards

Conditional statement

A statement that evaluates code to determine if it meets a specified set of conditions

69
New cards

Confidentiality

The idea that only authorized users can access specific assets or data

70
New cards

Confidential data

Data that often has limits on the number of people who have access to it

71
New cards

Confidentiality, integrity, availability (CIA) triad

A model that helps inform how organizations consider risk when setting up systems and security policies

72
New cards

Configuration file

A file used to configure the settings of an application

73
New cards

Containment

The act of limiting and preventing additional damage caused by an incident

74
New cards

Controlled zone

A subnet that protects the internal network from the uncontrolled zone

75
New cards

Cross-site scripting (XSS)

An injection attack that inserts code into a vulnerable website or web application

76
New cards

Crowdsourcing

The practice of gathering information using public input and collaboration

77
New cards

Cryptographic attack

An attack that affects secure forms of communication between a sender and intended recipient

78
New cards

Cryptographic key

A mechanism that decrypts ciphertext

79
New cards

Cryptography

The process of transforming information into a form that unintended readers can’t understand

80
New cards

Cryptojacking

A form of malware that installs software to illegally mine cryptocurrencies

81
New cards

CVE Numbering Authority (CNA)

An organization that volunteers to analyze and distribute information on eligible CVEs

82
New cards

Cybersecurity (or security)

the practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

83
New cards

Data

Information that is translated, processed, or stored by a computer

84
New cards

Data at rest

Data not currently being accessed

85
New cards

Database

An organized collection of information or data

86
New cards

Data controller

A person that determines the procedure and purpose for processing data

87
New cards

Data custodian

Anyone or anything that’s responsible for the safe handling, transport, and storage of information

88
New cards

Data exfiltration

Unauthorized transmission of data from a system

89
New cards

Data in transit

Data traveling from one point to another

90
New cards

Data in use

Data being accessed by one or more users

91
New cards

Data owner

The person who decides who can access, edit, use, or destroy their information

92
New cards

Data packet

A basic unit of information that travels from one device to another within a network

93
New cards

Data point

A specific piece of information

94
New cards

Data processor

A person that is responsible for processing data on behalf of the data controller

95
New cards

Data protection officer (DPO)

An individual that is responsible for monitoring the compliance of an organization's data protection procedures

96
New cards

Data type

A category for a particular type of data item

97
New cards

Date and time data

Data representing a date and/or time

98
New cards

Debugger

A software tool that helps to locate the source of an error and assess its causes

99
New cards

Debugging

The practice of identifying and fixing errors in code

100
New cards

Defense in depth

A layered approach to vulnerability management that reduces risk