INFO ASSURANCE PRELIMS

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

2
New cards

Security Architect

An individual responsible for maintaining the security of a company’s computer system.

3
New cards

Security Consultant

An advisor and supervisor for all security measures necessary to effectively protect a company or client’s assets.

4
New cards

Ethical Hacker

A hacker who uses their skills for ethical purposes, also referred to as a white hat hacker.

5
New cards

Chief Information Security Officer (CISO)

The individual responsible for an organization’s information and data security.

6
New cards

Ransomware

A type of malicious software designed to extort money by blocking access to files or the computer system until a ransom is paid.

7
New cards

Malware

Software designed to gain unauthorized access or cause damage to a computer.

8
New cards

Social engineering

A tactic used to trick a user into revealing sensitive information.

9
New cards

Phishing

The practice of sending fraudulent e-mails that resemble those from reputable sources.

10
New cards

Crypting services

Services used for encrypting malware to obscure and make the data difficult to detect.

11
New cards

Crimeware

The buying and selling of malware on the Dark Web.

12
New cards

Remote administration tools

A type of malware that grants hackers control over the infected computer.

13
New cards

Keyloggers

Malware that tracks keystrokes to eavesdrop on conversations and steal login credentials.

14
New cards

Exploit kits

Tools that target users visiting what they believe to be a trusted site but are redirected to a malicious one.

15
New cards

Leaked data

Data stolen from a user’s machine that can be easily sold on the Dark Web.

16
New cards

Card skimmers

Devices implanted in POS machines or ATMs to steal identity and credit card information.

17
New cards

Unpatched systems

Systems with vulnerabilities that can be resolved through the application of software patches.

18
New cards

Hardware authentication

A method to improve security by ensuring that weak passwords and usernames are not used.

19
New cards

Cloud technology

Technology that significantly impacts the transformation of systems security.

20
New cards

Deep learning

A field encompassing technologies like machine learning and artificial intelligence.

21
New cards

The Anatomy of a Cyberattack: Step 1

Reconnaissance, where hackers gather information about the target organization.

22
New cards

The Anatomy of a Cyberattack: Step 2

Attack, where hackers gain access to the network.

23
New cards

The Anatomy of a Cyberattack: Step 3

Expansion, where hackers intrude into all systems on the network.

24
New cards

The Anatomy of a Cyberattack: Step 4

Obfuscation, where hackers hide their tracks to mask the origins of the attack.