Cyber Security

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

Quiz February 4th

Last updated 7:56 PM on 2/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

advanced persistent threat (APT)

a cyber attack campaign with specific objectives, conducted by a coordinated team of experts, combining organizations, intelligence, complexity and patience

2
New cards

Air-Gap

to physically isolate a computer or network from other unsecure networks, including the public internet to prevent network-enabled attacks

3
New cards

Botnet

a network of “zombie” computers controlled by a single actor. They are common tools for malicious activity on the Internet, including denial-of-service attacks and spam, since they provide free (stolen) computation and network resources while hiding the identity of the controller.

4
New cards

cloud computing

a shift in control of computing resources from the individual or organization to a shared resource run by a third party. By pooling network-enabled resources, cloud computing enables mobility, scalability, flexibility, and efficiency, but increases the dependency on the cloud provider

5
New cards

computer emergency response team (CERT)

Organizations located around the world that serve as hubs of cyber security technical expertise, collaboration, and security information dissemination. Many governments have their own national CERTs, as do an increasing number of industrial sectors and large organizations.

6
New cards

Computer Network operations (CNO)

military concept of utilizing computers to “destroy, deny, degrade, disrupt and deceive” while at the same time preparing and defending against the enemies attempt to do the same

7
New cards

critical infrastructure

the underlying components of the economy that run out modern-day civilization, ranging from power and water to banking health care and transportation many countires have special policies and regulations for critical infastucture protection

8
New cards

Cyberterrorism

as defined by the FBI a “premeditated politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by subnational groups or clandestine agents

9
New cards

distributed denial of service (DDoS)

an attack that seeks to inundate a targeted systems functions or connection to the internet. attackers distribute the overwhelming traffic across multiple sources often using botnets of thousands or even millions of machines

10
New cards

Domain Name Systems (DNS)

the hierarchical, distributed naming system that translates the humanly memorable names (like BC.edu) into numeric IP adresses (192.245.194.172)

11
New cards

Firewall

a filter that rejects data traffic from entering a specific network or machine following specific rules

12
New cards

Hacker

A passionate technicals expert who ignores rules. it is not necessarily a malicious actor (“white hat” hackers try to find and close weaknesses before a “black hat” criminal can)

13
New cards

Hacktivism

Combining hacking with activism, the use of computer means of protest and attack to aid in the cause of civil disobedience

14
New cards

HyperText Transfer Protocol (HTTP)

the technical protocol that defines how applications ask for and deliver content on the world wide web

15
New cards

International Telecommunications union (ITU)

formed in 1865 to regulate cross-border telegraph communications a UN agency that coordinates international communication policies and interconnections

16
New cards

Internet Corporation for assined names and number (ICANN)

the private non-profit created in 1998 to run the various internet administration and operations tasks that had previously been performed by US government organizations

17
New cards

Internet Protocol (IP)

the primary principal communications protocal that enables internet workings it defines adressing methods and how to deliver packets from one point to another soley based on their IP adress

18
New cards

Internet Protocol IP adress

a numerical label that is assigned to an addressable connection to the internet: an endpoint

19
New cards

internet service provider (ISP)

an organization that provides access to the internet as well as other services such as web hosting or e-mail. it is a primary control point since all traffic from an individual or organization flows through

20
New cards

Malware

malicious or malevolent software including viruses, worms, and trojans that is preprogramed to attack disrupt and or compromise other computers and networks a packaged exploitation of vulnerability there is often a payload of instructions detailing what the system should do after it has been compromised

21
New cards

packet

digital envelope of data by breaking up flows of data into smaller components packets can each be delivered in an independent and decentralized fashion then reassembled at the endpoint. when conversations are broken into smaller partys packets from multiple different conversations can share te same network links without a controlled path or dedicated circuits

22
New cards

patch

a software code update vendors use security patches to mitigate of fix security vulnerabilities

23
New cards

secure internet protocol router network (SIPRNet)

the us military classified network used to communicate secret information following the same basic protocols as the broader internet

24
New cards

supervisory control and data acquisitions (SCADA)

a type of industrial control system particularly used to monitor and manage interconnected sensors and control large facilities

25
New cards

transport control protocol (TCP)

paired with the internet protocol one of the foundational protocols of the internet it manages expectations tat each end of a networked communication link has of the other end

26
New cards

virus

a malware program that can replicate itself and spread from computer to computer

27
New cards

worm

a type of malware that spreads automatically over a network installing and replicating itself the network traffic from apid replication and spread can cripple networks even when the malware does not have malicius payload

28
New cards

zero day

an attack that exploits a previously unknown vulnerability

29
New cards

zombie

a computer that has been compromised by and outside party, for the purpose of exploiting its computation and network resources frequently linked to botnet