INFO ASSURANCE PRELIMS

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 23

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

24 Terms

1

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks.

New cards
2

Security Architect

An individual responsible for maintaining the security of a company’s computer system.

New cards
3

Security Consultant

An advisor and supervisor for all security measures necessary to effectively protect a company or client’s assets.

New cards
4

Ethical Hacker

A hacker who uses their skills for ethical purposes, also referred to as a white hat hacker.

New cards
5

Chief Information Security Officer (CISO)

The individual responsible for an organization’s information and data security.

New cards
6

Ransomware

A type of malicious software designed to extort money by blocking access to files or the computer system until a ransom is paid.

New cards
7

Malware

Software designed to gain unauthorized access or cause damage to a computer.

New cards
8

Social engineering

A tactic used to trick a user into revealing sensitive information.

New cards
9

Phishing

The practice of sending fraudulent e-mails that resemble those from reputable sources.

New cards
10

Crypting services

Services used for encrypting malware to obscure and make the data difficult to detect.

New cards
11

Crimeware

The buying and selling of malware on the Dark Web.

New cards
12

Remote administration tools

A type of malware that grants hackers control over the infected computer.

New cards
13

Keyloggers

Malware that tracks keystrokes to eavesdrop on conversations and steal login credentials.

New cards
14

Exploit kits

Tools that target users visiting what they believe to be a trusted site but are redirected to a malicious one.

New cards
15

Leaked data

Data stolen from a user’s machine that can be easily sold on the Dark Web.

New cards
16

Card skimmers

Devices implanted in POS machines or ATMs to steal identity and credit card information.

New cards
17

Unpatched systems

Systems with vulnerabilities that can be resolved through the application of software patches.

New cards
18

Hardware authentication

A method to improve security by ensuring that weak passwords and usernames are not used.

New cards
19

Cloud technology

Technology that significantly impacts the transformation of systems security.

New cards
20

Deep learning

A field encompassing technologies like machine learning and artificial intelligence.

New cards
21

The Anatomy of a Cyberattack: Step 1

Reconnaissance, where hackers gather information about the target organization.

New cards
22

The Anatomy of a Cyberattack: Step 2

Attack, where hackers gain access to the network.

New cards
23

The Anatomy of a Cyberattack: Step 3

Expansion, where hackers intrude into all systems on the network.

New cards
24

The Anatomy of a Cyberattack: Step 4

Obfuscation, where hackers hide their tracks to mask the origins of the attack.

New cards
robot