Mis 200 Final Cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/119

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

120 Terms

1
New cards

Cybersecurity Threat

Event with potential for asset loss and undesirable consequences

2
New cards

Types of Asset Loss

Includes intentional, unintentional, misuse, abuse, error events

3
New cards

Cybersecurity Vulnerabilities

Weaknesses in system security that can be compromised

4
New cards

Cybersecurity Exploits

Means for hackers to execute malicious activities on a system

5
New cards

Types of Cybersecurity Breaches

Unauthorized access to an organization's systems, data, and information

6
New cards

Social Engineering

Manipulation of people to divulge confidential information

7
New cards

DDOS Attack

Cyberattack to make a computer or online service unavailable

8
New cards

Cybersecurity Mitigation

Policies and procedures to prevent security incidents

9
New cards

Threat Prevention

Policies to protect systems and data from threats

10
New cards

Threat Identification

Tools designed to identify specific security threats

11
New cards

Threat Cure

Strategies used to lessen the impact of active security threats

12
New cards

Social Engineering Attacks

Designed to get individuals to divulge sensitive information

13
New cards

Confidentiality Goals

Protecting systems, data, and information from theft or attack

14
New cards

Integrity Goals

Maintaining data, information, and system integrity

15
New cards

External Threats to Cybersecurity

Risks external to the organization, including malware and phishing attacks

16
New cards

Internal Threats to Cybersecurity

Threats from inside the organization, including accidents and intentional attacks

17
New cards

Spyware

Software collecting information about Internet habits and behaviors

18
New cards

Adware

Software collecting the user's web browsing history

19
New cards

Cybersecurity Goals

Protecting systems, data, and information from theft or attack

20
New cards

Integrity Measures

Maintained through user-access controls, file permissions, version controls

21
New cards

Cybersecurity Breaches

Early-stage intrusions leading to system damage, data loss, and network downtime

22
New cards

Common Social Engineering Attacks

Designed to get individuals to divulge sensitive information

23
New cards

Web Crawlers

Bots used to gather information from websites

24
New cards

Malware Bots

Bots that infect hosts with self-propagating malware

25
New cards

Ransomware

Malware that encrypts data and demands ransom

26
New cards

Rootkit

Malware that hides in OS to control a computer

27
New cards

Keyloggers

Spyware recording keystrokes on devices

28
New cards

Trojan Horse

Program pretending to be legitimate but carries out unwanted activities

29
New cards

MitM Attack

Wrongdoer intercepts communication between user and application

30
New cards

Risk Analysis

Balances costs and benefits of cybersecurity countermeasures

31
New cards

Plan-Protect-Respond Cycle

Methodology for responding to security incidents

32
New cards

Security Posture Assessment

Evaluating existing security measures in place

33
New cards

Awareness Training

Educating employees to identify threats and follow protection policies

34
New cards

Identity Management

Control measures for physical and remote access to IT systems

35
New cards

Cybersecurity Response Planning

Preparing and executing activities during and after a security incident

36
New cards

Communication Management

Ensuring proper information dissemination during and after a cybersecurity event

37
New cards

Mitigation Activities

Efforts to minimize the impact and spread of a cybersecurity event

38
New cards

Lessons Learned Analysis

Reviewing incidents to prevent and respond better to future attacks

39
New cards

Customer Relationship Management Systems

Tools to assist businesses in managing customer relationships

40
New cards

Customer Acquisition

Processes to obtain new customers through various marketing strategies

41
New cards

Lead Generation Funnel

Process starting with customer interest leading to purchase

42
New cards

Marketing Qualified Leads (MQLs)

Prospective customers showing interest in a brand or product

43
New cards

Sales Qualified Leads (SQLs)

Leads ready to make a purchase after being qualified

44
New cards

Market Segmentation

Dividing customers into groups based on traits and interests

45
New cards

Target Market

Group of customers an organization aims to sell products/services to

46
New cards

Prospecting

Searching for potential customers and converting them to customers

47
New cards

Qualifying Potential Customers

Determining if an individual or business is worth pursuing as a customer

48
New cards

Customer Surveys

Feedback collection method to understand customer needs and preferences

49
New cards

Customer Interaction

All communication between customers and an organization

50
New cards

CRM Strategy

Plan including monitoring interactions, individual customer focus, automation, and customized communication

51
New cards

Monitor Customer Interactions

Using CRM to identify engaging communication methods

52
New cards

Customers as Individuals

Ensuring each customer has an individual contact record

53
New cards

Automation

CRM generates automatic responses, task scheduling, and communications

54
New cards

Customized Communication

CRM ensures messages are tailored to the customer

55
New cards

CRM Systems

Provide services to sales, marketing, and business development

56
New cards

CRM Software

Stores customer information for better targeting, tracking, and management

57
New cards

Identity Data

Demographic info like name, address, gender, and contact details

58
New cards

Quantitative Data

Includes transaction history, online activity, and customer service interactions

59
New cards

Qualitative Data

Reflects customer feelings, attitudes, opinions, and motivations

60
New cards

Descriptive Data

Additional demographic info like family status, lifestyle, and education

61
New cards

CRM Analytics

Provides insights into customer behavior for informed decisions

62
New cards

OLAP

Online analytical processing technology for data analysis and forecasting

63
New cards

Customer Segmentation

Grouping customers for behavior analysis

64
New cards

Customer Value and Profitability

Identifying high-revenue customers

65
New cards

Personalization

Customized marketing based on individual behavior

66
New cards

Predictive Modeling

Using past data to predict future outcomes

67
New cards

Share of Customer

Focuses on maximizing business from existing customers

68
New cards

Customer Equity

Value of future revenue minus acquisition and retention costs

69
New cards

Customer Profitability

Profit from selling to customers over a period

70
New cards

Customer Lifetime Value

Total amount a customer will spend over their lifetime

71
New cards

Data Breaches

Security risks from misconfigured databases exposing customer info

72
New cards

Ethical Considerations

Concerns about selling customer data to third parties

73
New cards

CRM Market Analytics

Utilized to guide new product development

74
New cards

Viability

Testing the feasibility of products or services

75
New cards

User Experience

Capturing data on customer product usage and buying behavior

76
New cards

Product Development

Insights from CRM analytics that foster innovation

77
New cards

Data Analytics

Investigating raw data to uncover trends and correlations.

78
New cards

Descriptive Analytics

Reveals historical trends in data sets, answering 'What happened?'

79
New cards

Predictive Analytics

Focuses on predicting future events and outcomes.

80
New cards

Prescriptive Analytics

Focuses on recommending actions for future outcomes.

81
New cards

Return on Investment (ROI)

Example of Descriptive Analytics, measures profitability.

82
New cards

Probability Analysis

Techniques used in Predictive Analytics to forecast outcomes.

83
New cards

Data Fabric

Set of data services spanning on-premise and Cloud environments.

84
New cards

Data Ecosystems

IT architecture, software, and technologies for data collection.

85
New cards

Key Performance Indicators (KPIs)

Metrics used to evaluate success or failure in business.

86
New cards

Data Visualization

Representing data graphically for easier understanding.

87
New cards

Structured Query Language (SQL)

Used to query databases and extract specific information.

88
New cards

Information Dashboards

Visual displays of consolidated data for key insights.

89
New cards

Spreadsheets

Software for data collection, organization, and manipulation.

90
New cards

Databases

Store, organize, and manipulate data, queried using SQL.

91
New cards

Data Visualization Tools

Create charts, tables, and graphs for data representation.

92
New cards

90% of Information to Brain

Visual data transmission dominance in human brain processing.

93
New cards

Pie Chart

Visual representation of data in a circular graph.

94
New cards

Bar Graph

Visual representation of data in rectangular bars.

95
New cards

Line Graph

Visual representation of data with points connected by lines.

96
New cards

Scatterplot

Visual representation of data points on a Cartesian plane.

97
New cards

Traditional File Management Systems

Pre-computer manual systems for data storage and processing

98
New cards

Data Redundancy

Duplication of data leading to inefficiency and higher costs

99
New cards

Data Inconsistency

Mismatch or errors in data across multiple records

100
New cards

DBMS

Computer program for creating, processing, and managing databases