Introduction to Cybersecurity – Vocabulary Flashcards

0.0(0)
studied byStudied by 2 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/109

flashcard set

Earn XP

Description and Tags

A comprehensive set of vocabulary flashcards covering key cybersecurity concepts, threats, controls, and best practices discussed in the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

110 Terms

1
New cards
<p>Cybersecurity</p>

Cybersecurity

The ongoing practice of protecting networks, systems, and data from unauthorized access, attack, or damage.

2
New cards

Personal Data

Any information (e.g., name, SSN, address) that can be used to identify an individual.

3
New cards

Online Identity

The persona and credentials you establish and use on the internet.

4
New cards

Username Best Practices

Choosing unique, non-identifying names and avoiding reuse to reduce password-guessing risks.

5
New cards

Organizational Data

Information critical to a company’s operations, including IP, financials, and customer records.

6
New cards

Intellectual Property

Trademarks, patents, trade secrets, and product plans owned by an organization.

7
New cards

The Foundational Principles (CIA Triad)

The three foundational principles of information security: Confidentiality, Integrity, Availability.

8
New cards

Confidentiality

Restricting information access to authorized users only.

9
New cards

Integrity

Protecting data and systems from unauthorized or accidental alteration.

10
New cards

Availability

Ensuring authorized users can access data and systems when needed.

11
New cards

Protecting Information in Processing

Data actively being used or modified by a system.

12
New cards

Protecting Information in Storage

Data at rest residing on media such as SSDs, USB drives, or cloud storage.

13
New cards

Protecting Information in Transmission

Data moving between systems across a network.

14
New cards

Technical Controls

Hardware and software solutions like firewalls or encryption that enforce security.

15
New cards

Cyberattacker

An individual or group that exploits systems for personal, financial, or political gain.

16
New cards

Script Kiddie

An inexperienced hacker who uses existing tools or scripts to launch attacks.

17
New cards

White Hat Hacker

Security professional who lawfully tests systems and reports vulnerabilities.

18
New cards

Black Hat Hacker

Malicious hacker who exploits weaknesses for illegal, personal, or financial benefit.

19
New cards

Grey Hat Hacker

Hacker who explores systems without permission but may disclose findings without malicious intent.

20
New cards

Hacktivist

Attacker who hacks to promote a political or social cause.

21
New cards

Organized Crime Hacker

Group-based attackers seeking financial gain through cybercrime services.

22
New cards

State-Sponsored Hacker

Well-funded, highly trained attacker acting on behalf of a government.

23
New cards
<p>Cyberwarfare</p>

Cyberwarfare

Nation-state use of cyber tools to disrupt or damage another country's infrastructure.

24
New cards

Stuxnet

A sophisticated state-sponsored worm that caused physical damage to Iranian centrifuges.

25
New cards

Malware

Any malicious code designed to harm, steal, or compromise systems.

26
New cards

Spyware

Software that secretly monitors user activity and collects data by modifying security settings.

27
New cards

Adware

Programs that auto-display unwanted ads and may track user behavior.

28
New cards

Backdoor

Hidden method of bypassing normal authentication to gain system access.

29
New cards

Ransomware

Malware that encrypts data and demands payment for decryption.

30
New cards

Trojan Horse

Malware disguised as legitimate software to trick users into installing it, often found in games, images Or audio files

31
New cards

Rootkit

Stealthy malware that hides its presence and grants elevated privileges to attackers.

32
New cards

Worm

Self-replicating malware that spreads across networks without a host program

33
New cards

Virus

Malware that requires end user interaction which attaches to legitimate files, replicates, and can damage data

34
New cards
<p>Methods of Infiltration </p>

Methods of Infiltration

Tactics used by cyber attackers to gain unauthorized access to systems. Include phishing, on-path attacks, SEO poisoning and social engineering.

35
New cards

Botnets

36
New cards
37
New cards

Denial of Service (DoS)

Attack that disrupts service by overwhelming a target with traffic or requests.

38
New cards

Distributed Denial of Service (DDoS)

DoS attack launched from multiple compromised systems simultaneously.

39
New cards

Social Engineering

Manipulating people into revealing confidential information or performing unsafe actions.

40
New cards

Phishing

Fraudulent emails or messages that trick users into revealing sensitive data.

41
New cards

Pretexting

Creating a fabricated scenario to persuade a victim to divulge information.

42
New cards

Quid Pro Quo Attack

Social engineering that offers a benefit (e.g., free gift) in exchange for information.

43
New cards

Man-in-the-Middle (MitM)

Attack where a hacker intercepts and potentially alters communications between two parties.

44
New cards

Man-in-the-Mobile (MitMo)

MitM variant that hijacks a victim’s mobile device, often to steal SMS 2FA codes.

45
New cards

SEO Poisoning

Manipulating search rankings to lure users to malicious sites.

46
New cards

Brute Force Attack

Systematic trial of all possible password combinations to gain access.

47
New cards

Password Spraying

Trying common passwords across many accounts to avoid lockouts.

48
New cards

Dictionary Attack

Using a commonly used list of words to guess passwords systematically.

49
New cards

Rainbow Table Attack

Matching captured password hashes against pre-computed hash tables to reveal plaintext.

50
New cards

Network Sniffing

Capturing network packets to read unencrypted passwords or data.

51
New cards

Advanced Persistent Threat (APT)

Stealthy, long-term, well-funded attack campaign against a specific target.

52
New cards
<p>Security Vulnerabilities </p>

Security Vulnerabilities

Any kind of hardware or software defect

53
New cards
<p>Exploit</p>

Exploit

Code or technique that takes advantage of a vulnerability to perform an attack.

54
New cards

Hardware Vulnerability

Security flaw built into physical components like CPUs (e.g., Meltdown, Spectre).

55
New cards

Software Vulnerability

Defect in code or configuration that exposes a system to attack.

56
New cards

Buffer Overflow

Writing data beyond a buffer’s limits, potentially hijacking control flow.

57
New cards

Race Condition

Flaw where system behavior depends on timing of events, enabling attacks.

58
New cards

Non-Validated Input

A vulnerability in which data supplied to a program, by a user or exploit causes the app to behave in an untended way.

59
New cards

Weak Access Controls

improper use of practices that manage physical control of equipment, data or apps

60
New cards
<p>Cryptocurrency</p>

Cryptocurrency

Digital currency (e.g., Bitcoin) secured by cryptography and recorded on a blockchain.

61
New cards

Blockchain

Decentralized ledger that immutably records cryptocurrency transactions in blocks.

62
New cards

Mining

A complex process involving miners solving math puzzles

63
New cards

Cryptojacking

Unauthorized use of someone’s computing resources to mine cryptocurrency.

64
New cards

Ways to protect your devices and networks

  • Turn on your firewall

  • Install antivirus and antispyware

  • Manage operating system

  • Set up password protection

65
New cards
<p>Firewall</p>

Firewall

Security device or software that filters incoming and outgoing network traffic to protect device from unauthorized access

66
New cards

Antivirus & antispyware

Downloaded to scan computers and incoming emails for viruses or spyware and delete them.

67
New cards

Shodan

A web-based IoT device that identifies any vulnerable devices on three internet

68
New cards

Wireless Network

A ‘magic pathway’ that allows your devices to connect to the internet without any wires

69
New cards

SSID

Service Set Identifier

70
New cards

WPA2

Wireless Protected Access 2

71
New cards

How can you secure your wireless network?

  • Enable WPA2 encryption

  • Update devices

  • Use wired connections for devices with a network interface card (NIC)

  • Use virtual private network (VPNs) for wireless networks

72
New cards

Intrusion Prevention System (IPS)

Appliance that uses a set of traffic signatures that match & block malicious traffic and attacks

73
New cards

Virtual Private Network (VPN)

Encrypted tunnel from mobile computers that secures remote connectivity to a private network.

74
New cards

Types of Firewall

  • Network layer

  • Transport Layer

  • Application Layer

  • Context aware layer

  • Proxy server*

  • Reverse Proxy Server

  • Network Address Translation (NAT)*

  • Host-based firewall*

75
New cards

Routers

Provide basic traffic filtering capabilities which helps to define which computer from a given network segment can communicate with which network segments

76
New cards

Security appliances

  • Routers

  • Virtual Private Networks (VPN)

  • Intrusion Prevention Systems (IPS)

  • Firewalls

  • Antimalware

77
New cards

Encryption

The process of converting Information into a form which unauthorized parties can’t read. Only a trusted authorized person with the secret key can decrypt data to it’s original form

78
New cards

Backing up Data

Prevents the loss of irreplaceable data

79
New cards

Data Storage Locations

  • Home network

  • Secondary Location; Network Attached Storage (NAS) device, thumb drive or external drive

  • The Cloud

80
New cards

Permanent deletion of data

  • Overwrite data with 1s and 0s multiple times using specifically designed tools

  • Physically destroy data

81
New cards

Antimalware

Software that detects, prevents, and removes malicious code on endpoints.

82
New cards

Network Layer Firewall

Filters communication based on source & destination IP addresses

83
New cards

Transport Layer Firewall

Filters communication based on source & destination data parts and connection states

84
New cards

Application Layer Firewall

Filters communication based on source of an app, program or service

85
New cards

Context-Aware Firewall

Considers user, device, role, app type and threat intel to enforce granular policies.

86
New cards

Proxy Server

Filters web contact requests like URLs, domain names & media types

87
New cards

Reverse Proxy Server

Protect, hide, offload & distribute access to web servers when placed in front of them

88
New cards

Network Address Translation (NAT) Firewall

Masks private IP addresses by translating them to a single public IP.

89
New cards

Host-Based Firewall

Software firewall running on an individual computer that filters local traffic.

90
New cards

Encrypting File System (EFS)

Windows feature that encrypts files tied to a specific user account.

91
New cards

Backup

Creating a duplicate copy of data to enable recovery after loss.

92
New cards

Cloud Backup

Storing data copies in a cloud service such as AWS for off-site protection.

93
New cards

Data Shredding

Secure deletion method ensuring data cannot be recovered from storage media.

94
New cards

Terms of Service

Legal contract outlining rules between a user, a service provider and others who use the service.

95
New cards

Data Use Policy

Statement explaining how a provider collects, uses, and shares user data.

96
New cards

Privacy Settings

User controls that determine who can view or access personal information online.

97
New cards

Security Policy

Organization’s formal plan describing measures to protect collected data.

98
New cards

Two-Factor Authentication

Login method requiring two or more verification factors (e.g., password + code).

99
New cards

Open Authentication (OAuth)

Open standard protocol allowing users to grant apps access using existing credentials without sharing passwords.

100
New cards

Private Browsing Mode

Browser feature that disables cookies, history, and temporary files for the session.