Foundations of Cyber Security

0.0(0)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:40 AM on 10/1/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

35 Terms

1
New cards

CIA Triad

A model guiding organizations in risk management regarding confidentiality, integrity, and availability.

2
New cards

Compliance

Adhering to internal standards and external regulations.

3
New cards

Security Governance

Practices that define and direct an organization’s security efforts.

4
New cards

Security Ethics

Guidelines for making ethical decisions in security roles.

5
New cards

Security Frameworks

Guidelines for building plans to mitigate risks to data and privacy.

6
New cards

Confidentiality

Ensuring that only authorized users can access specific assets or data.

7
New cards

Integrity

The assurance that data is correct, authentic, and reliable.

8
New cards

Availability

Ensuring that data is accessible to authorized users.

9
New cards

Threat

Any event that can negatively impact assets.

10
New cards

Threat Actor

Individuals or groups posing security risks.

11
New cards

Internal Threat

Current or former employees or trusted partners posing a security risk.

12
New cards

External Threat

Risks posed by individuals or entities outside the organization.

13
New cards

Adversarial Artificial Intelligence

Techniques that manipulate AI and machine learning to conduct attacks efficiently.

14
New cards

Phishing

Digital communications designed to trick individuals into revealing sensitive data.

15
New cards

Spear Phishing

Targeted phishing attacks directed at specific individuals.

16
New cards

Social Engineering

Techniques exploiting human error to gain private information.

17
New cards

Vishing

Exploiting voice communication to obtain sensitive information.

18
New cards

USB Baiting

Leaving malware-infected USB drives for users to find and connect.

19
New cards

Watering Hole Attack

Compromising a website frequented by a specific user group.

20
New cards

Supply-Chain Attack

Targeting vulnerabilities in systems, applications, or software.

21
New cards

Physical Attack

Security incidents affecting both digital and physical environments.

22
New cards

Antivirus Software

Programs used to prevent, detect, and eliminate malware and viruses.

23
New cards

Malware

Software designed to harm devices or networks.

24
New cards

Intrusion Detection System (IDS)

An application that monitors system activity for potential intrusions.

25
New cards

Security Information and Event Management (SIEM)

Applications that collect and analyze log data for monitoring.

26
New cards

Network Security

Practices to secure an organization's network from unauthorized access.

27
New cards

Cloud Security

Ensuring that cloud-stored assets are configured correctly and accessible only to authorized users.

28
New cards

Personally Identifiable Information (PII)

Information that can be used to infer an individual’s identity.

29
New cards

Sensitive Personally Identifiable Information (SPII)

A specific type of PII with stricter handling guidelines.

30
New cards

Protected Health Information (PHI)

Information regarding an individual’s health or medical conditions.

31
New cards

Cybersecurity Analyst

Focuses on monitoring networks for breaches, developing security strategies, and researching IT security trends.

32
New cards

Security Architecture

A design composed of components to protect an organization from risks.

33
New cards

Security Posture

An organization's ability to manage its defense against threats.

34
New cards

Health Insurance Portability and Accountability Act (HIPAA)

U.S. federal law protecting patients’ health information.

35
New cards

National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

A voluntary framework with standards to manage cybersecurity risk.