cyber security terms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

theses are all the terms you should be studying for cyber AP exam

Last updated 8:39 PM on 3/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

Sophisticated attacks

Sophisticated attacks are complex, making them difficult to detect and thwart. Sophisticated attacks:

  • Use common internet tools and protocols, making it difficult to distinguish an attack from legitimate traffic.

  • Vary their behavior, making the same attack appear differently each time.

2
New cards

Proliferation of attack software

A wide variety of attack tools are available on the internet, allowing anyone with a moderate level of technical knowledge to download the tools and run an attack.

3
New cards

Attack scale and velocity

The scale and velocity of an attack can grow to millions of computers in a matter of minutes or days due to its ability to proliferate on the internet. Because modern attacks are not limited to user interactions, such as using a floppy disk to spread an attack from machine to machine, the attacks often affect very large numbers of computers in a relatively short amount of time.

4
New cards

Security control

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.

5
New cards

Managerial

A category of security control that provides oversight of information systems.

6
New cards

Operational

A category of security control that is implemented by people.

7
New cards

Technical

A category of security control that is implemented as a system.

8
New cards

Physical

A category of security control that is implemented by hardware used to deter or detect, such as alarms, gateways, locks, lighting, and security cameras.

9
New cards

Preventive

A type of security control that acts before an incident to eliminate or reduce the likelihood that an attack can succeed.

10
New cards

Access control lists (ACLs)

The collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write, and so on).

11
New cards

Detective

A type of security control that acts during an incident to identify or record that it is happening.

12
New cards

Corrective

A type of security control that acts after an incident to eliminate or minimize its impact.

13
New cards

Directive

A type of control that enforces a rule of behavior through a policy or contract.

14
New cards

Deterrent

A type of security control that discourages intrusion attempts.

15
New cards

Compensating

A security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations.

16
New cards

Chief Information Officer (CIO)

A company officer with the primary responsibility of managing information technology assets and procedures.

17
New cards

Chief Technology Officer (CTO)

A company officer with the primary role of making effective use of new and emerging computing platforms and innovations.

18
New cards

Chief Security Officer (CSO)

Typically, the job title of the person with overall responsibility for information assurance and systems security.

19
New cards

Lab simulator

The lab simulator is a CertMaster learning tool that presents a virtual environment that you can manipulate like an actual environment.

20
New cards

Lab tasks

The tasks necessary to complete the lab.

21
New cards

Navigation bar

A lab simulation feature used to change to a new location, such as a building, floor, or office.

22
New cards

Shelf

An area that contains hardware components that may be used in the simulation.

23
New cards

Exhibits

Additional information about the simulation environment that may be useful in completing the lab.

24
New cards
25
New cards
26
New cards
27
New cards
28
New cards
29
New cards

Explore top notes

note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)
note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)

Explore top flashcards

flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)
flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)