4. Security Operations and Incident Response

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:58 PM on 1/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

27 Terms

1
New cards

AV

Antivirus: Software detecting and removing malware

2
New cards

CERT

Computer Emergency Response Team: Expert group handling computer security incidents

3
New cards

CIRT

Computer Incident Response Team: Group responsible for security incident handling

4
New cards

DDoS

Distributed Denial of Service: Attack where multiple systems flood a target

5
New cards

DLP

Data Loss Prevention: Systems preventing sensitive data leakage or theft

6
New cards

DoS

Denial of Service: Attack aiming to make a resource unavailable

7
New cards

EDR

Endpoint Detection and Response: Tools monitoring endpoint systems to detect and respond to threats

8
New cards

FIM

File Integrity Management: Process verifying file validity through comparison

9
New cards

HIDS

Host-based Intrusion Detection System: System monitoring and analyzing activities on individual hosts

10
New cards

HIPS

Host-based Intrusion Prevention System: HIDS with active prevention capabilities

11
New cards

IDS

Intrusion Detection System: Device or software detecting network or system intrusions

12
New cards

IoC

Indicators of Compromise: Artifacts indicating system compromise

13
New cards

IPS

Intrusion Prevention System: IDS with active threat prevention capabilities

14
New cards

IR

Incident Response: Organized approach to addressing security incidents

15
New cards

IRP

Incident Response Plan: Documented procedures for responding to security incidents

16
New cards

NGFW

Next-generation Firewall: Integrated network platform with advanced filtering capabilities

17
New cards

NIDS

Network-based Intrusion Detection System: System monitoring network traffic for malicious activity

18
New cards

NIPS

Network-based Intrusion Prevention System: NIDS with active prevention capabilities

19
New cards

PCAP

Packet Capture: Application programming interface for capturing network traffic

20
New cards

PUP

Potentially Unwanted Program: Software that may be unwanted despite being consciously installed

21
New cards

RA

Recovery Agent: Entity that can decrypt data encrypted by others

22
New cards

RAT

Remote Access Trojan: Malware providing unauthorized remote access

23
New cards

SIEM

Security Information and Event Management: System providing real-time security event monitoring and analysis

24
New cards

SOC

Security Operations Center: Facility housing security analysts who monitor and respond to security events

25
New cards

SOAR

Security Orchestration, Automation, Response: Technologies automating security operations tasks

26
New cards

UTM

Unified Threat Management: Security appliance combining multiple security functions

27
New cards

XDR

Extended Detection and Response: Extended detection and response across endpoints, networks, and cloud

Explore top flashcards

G6 U2
Updated 479d ago
flashcards Flashcards (31)
Romantyzm
Updated 1173d ago
flashcards Flashcards (45)
Fenne's frans
Updated 1180d ago
flashcards Flashcards (765)
1017
Updated 393d ago
flashcards Flashcards (55)
G6 U2
Updated 479d ago
flashcards Flashcards (31)
Romantyzm
Updated 1173d ago
flashcards Flashcards (45)
Fenne's frans
Updated 1180d ago
flashcards Flashcards (765)
1017
Updated 393d ago
flashcards Flashcards (55)