1/24
A set of flashcards covering key vocabulary and concepts related to FBLA Cyber Security topics.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Adware
Software that displays pop-up advertisements to users based on their activities and browsing history.
Virus
Programs designed to spread from one system to another through self-replication and perform malicious activities.
Worm
Malicious software that travels throughout a network without user interaction.
Spyware
Software installed on a user's system without consent, often to control the computer and collect information.
Trojan
Malicious software disguised as useful or legitimate to trick users into installation.
Rootkit
A group of programs that hide the infection by embedding deep within an operating system.
Logic bomb
Malicious code that remains dormant until triggered by a specific event.
Botnet
A network of malware-controlled computers used to launch attacks.
DoS attack
An attack intended to make systems unavailable to users by overwhelming resources.
DDoS attack
A denial of service attack that uses multiple attacking computers.
Spoofing
Impersonating or masquerading as something else, often to modify IP addresses.
Man-in-the-middle attack
An attack where an attacker eavesdrops on communications between two parties.
Spear phishing
A targeted phishing attack directed at a specific individual or group.
Phishing
Sending unwanted emails to trick users into revealing personal information.
Shoulder surfing
Observing someone's screen or keyboard to gain access to confidential information.
Disaster Recovery Plan
A plan focused on reestablishing services and minimizing losses after a disaster.
RAID
A storage system that increases performance and provides fault tolerance.
High Availability
The goal of keeping services and systems operational during outages.
Redundancy
Having duplicated systems to ensure continuous operation in case of failure.
Fault Tolerance
A system's ability to continue operating in the event of a component failure.
Cyber Security Policy
Guidelines established to protect information and manage risk.
Separation of Duties
The principle of requiring more than one person to complete a task to reduce fraud.
Mandatory Access Control (MAC)
An access control model that uses sensitivity labels for users and data.
Discretionary Access Control (DAC)
An access control model where the owner of the object has full control over permissions.
Role-Based Access Control (RBAC)
An access control model that assigns permissions based on roles within the organization.