Cybersecurity Terms and Definitions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/56

flashcard set

Earn XP

Description and Tags

Flashcards for cybersecurity terms and definitions.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards

Availability

The idea that data is accessible to those who are authorized to access it.

2
New cards

Business Email Compromise (BEC)

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage.

3
New cards

Adversarial artificial intelligence

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently.

4
New cards

Antivirus software

A software program used to prevent, detect, and eliminate malware and viruses.

5
New cards

Asset

An item perceived as having value to an organization.

6
New cards

Cloud security

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users.

7
New cards

Compliance

The process of adhering to internal standards and external regulations.

8
New cards

Computer virus

Malicious code written to interfere with computer operations and cause damage to data and software.

9
New cards

Confidentiality

Only authorized users can access specific assets or data.

10
New cards

Hacker

Any person who uses computers to gain access to computer systems, networks, or data.

11
New cards

Confidentiality, integrity, availability (CIA) triad

A model that helps inform how organizations consider risk when setting up systems and security policies.

12
New cards

Cryptographic attack

An attack that affects secure forms of communication between a sender and intended recipient.

13
New cards

Cybersecurity (or security)

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

14
New cards

Database

An organized collection of information or data.

15
New cards

Data point

A specific piece of information.

16
New cards

Hacktivist

A person who uses hacking to achieve a political goal.

17
New cards

Health Insurance Portability and Accountability Act (HIPAA)

A U.S. federal law established to protect patients’ health information.

18
New cards

Integrity

The idea that the data is correct, authentic, and reliable.

19
New cards

Internal threat

A current or former employee, external vendor, or trusted partner who poses a security risk.

20
New cards

Intrusion detection system (IDS)

An application that monitors system activity and alerts on possible intrusions.

21
New cards

Linux

An open-source operating system.

22
New cards

Log

A record of events that occur within an organization’s systems.

23
New cards

Malware

Software designed to harm devices or networks.

24
New cards

National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF)

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.

25
New cards

Network protocol analyzer (packet sniffer)

A tool designed to capture and analyze data traffic within a network.

26
New cards

Network security

The practice of keeping an organization's network infrastructure secure from unauthorized access.

27
New cards

Open Web Application Security Project (OWASP)

A non-profit organization focused on improving software security.

28
New cards

Order of volatility

A sequence outlining the order of data that must be preserved from first to last.

29
New cards

Password attack

An attempt to access password secured devices, systems, networks, or data.

30
New cards

Personally identifiable information (PII)

Any information used to infer an individual’s identity.

31
New cards

Phishing

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

32
New cards

Programming

A process that can be used to create a specific set of instructions for a computer to execute tasks.

33
New cards

Protecting and preserving evidence

The process of properly working with fragile and volatile digital evidence.

34
New cards

Security information and event management (SIEM)

An application that collects and analyzes log data to monitor critical activities in an organization.

35
New cards

Physical attack

A security incident that affects not only digital but also physical environments where the incident is deployed.

36
New cards

Physical social engineering

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.

37
New cards

Privacy protection

The act of safeguarding personal information from unauthorized use.

38
New cards

Protected health information (PHI)

Information that relates to the past, present, or future physical or mental health or condition of an individual.

39
New cards

Security architecture

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats.

40
New cards

Security controls

Safeguards designed to reduce specific security risks.

41
New cards

Security ethics

Guidelines for making appropriate decisions as a security professional.

42
New cards

Security frameworks

Guidelines used for building plans to help mitigate risk and threats to data and privacy.

43
New cards

Security governance

Practices that help support, define, and direct security efforts of an organization.

44
New cards

Security posture

An organization’s ability to manage its defense of critical assets and data and react to change.

45
New cards

Sensitive personally identifiable information (SPII)

A specific type of PII that falls under stricter handling guidelines.

46
New cards

Spear phishing

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source.

47
New cards

Supply-chain attack

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.

48
New cards

SQL (Structured Query Language)

A programming language used to create, interact with, and request information from a database.

49
New cards

Social engineering

A manipulation technique that exploits human error to gain private information, access, or valuables.

50
New cards

Social media phishing

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack.

51
New cards

Technical skills

Skills that require knowledge of specific tools, procedures, and policies.

52
New cards

Threat

Any circumstance or event that can negatively impact assets.

53
New cards

Threat actor

Any person or group who presents a security risk.

54
New cards

Transferable skills

Skills from other areas that can apply to different careers.

55
New cards

USB baiting

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network.

56
New cards

Vishing

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

57
New cards

Watering hole attack

A type of attack when a threat actor compromises a website frequently visited by a specific group of users.