FBLA Cybersecurity Study Guide

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/103

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:00 AM on 1/22/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

104 Terms

1
New cards

Cybersecurity

Protecting systems, networks, and programs from digital attacks

2
New cards

Confidentiality

Ensuring information is accessible only to authorized users

3
New cards

Integrity

Ensuring data is not altered or corrupted

4
New cards

Availability

Ensuring data and systems are accessible when needed

5
New cards

CIA Triad

The three core principles of cybersecurity: confidentiality, integrity, and availability

6
New cards

Non-Repudiation

Proof that a sender cannot deny performing an action

7
New cards

Identification

Verifying a user's identity

8
New cards

Authentication

Verifying credentials to grant access

9
New cards

Authorization

Granting access to resources based on permissions

10
New cards

Accounting

Tracking user actions and system usage

11
New cards

Implicit Deny

Denying all access unless explicitly allowed

12
New cards

Least Privilege

Giving users only the access they need to perform their job

13
New cards

Zero Trust

Security model that assumes no user or system is trusted by default

14
New cards

Honeypot

A fake system designed to attract and detect attackers

15
New cards

Honeynet

A network of honeypots used to study attacker behavior

16
New cards

Attestation

Verifying that a system or user meets security requirements

17
New cards

Binary

Base-2 number system used in computing and cryptography

18
New cards

Hexadecimal

Base-16 number system used to represent binary data compactly

19
New cards

Decimal

Base-10 number system used by humans

20
New cards

Malware

Any software designed to harm or exploit systems

21
New cards

Virus

Malware that self-replicates and spreads through files or programs

22
New cards

Worm

Malware that spreads across networks without user interaction

23
New cards

Trojan Horse

Malware disguised as legitimate software

24
New cards

Spyware

Malware that secretly monitors user activity

25
New cards

Adware

Software that displays unwanted advertisements

26
New cards

Logic Bomb

Malware triggered by a specific event or time

27
New cards

Ransomware

Malware that encrypts data and demands payment

28
New cards

Rootkit

Malware that hides deep within an operating system

29
New cards

Botnet

Network of infected computers controlled by an attacker

30
New cards

Backdoor

Hidden access that bypasses system security

31
New cards

Zero-Day Vulnerability

A newly discovered flaw with no available patch

32
New cards

Unpatched Software

Software missing security updates

33
New cards

Insider Threat

A malicious or careless person inside an organization

34
New cards

Threat Actor

Individual or group that carries out cyber attacks

35
New cards

Social Engineering

Manipulating people to reveal confidential information

36
New cards

Phishing

Fake emails or messages to steal information

37
New cards

Spear Phishing

Targeted phishing aimed at specific individuals

38
New cards

Whaling

Phishing aimed at executives or high-value targets

39
New cards

Vishing

Voice-based phishing using phone or VoIP

40
New cards

SQL Injection

Injecting malicious code into a database through input fields

41
New cards

Cross-Site Scripting (XSS)

Injecting malicious scripts into websites

42
New cards

DDoS Attack

Flooding a system with traffic from multiple sources

43
New cards

Cryptographic Collision

Two different inputs producing the same hash

44
New cards

Birthday Attack

Exploiting hash collisions using probability

45
New cards

Wireless Vulnerability

Weakness in wireless networks such as weak encryption

46
New cards

Security by Design

Building security into every stage of system development

47
New cards

Threat Modeling

Identifying and prioritizing threats during system design

48
New cards

Secure SDLC

Integrating security into the software development lifecycle

49
New cards

Microservices Security

Increased risk due to multiple services and endpoints

50
New cards

Logical Segmentation

Separating systems using software controls

51
New cards

Physical Segmentation

Separating systems using physical infrastructure

52
New cards

Virtualization

Using virtual machines to isolate systems

53
New cards

Containerization

Running applications in isolated environments

54
New cards

Internet of Things (IoT) Risk

Security threats from connected smart devices

55
New cards

Backup

Copy of data used for recovery

56
New cards

UPS

Battery backup providing short-term power

57
New cards

RAID

Disk system that improves redundancy and performance

58
New cards

Sandbox

Isolated environment for testing untrusted code

59
New cards

Code Review

Examining code to detect vulnerabilities

60
New cards

Input Validation

Checking user input to prevent attacks

61
New cards

Secure Configuration

Maintaining approved system settings

62
New cards

Cryptography

Protecting data using encryption techniques

63
New cards

Symmetric Encryption

Uses the same key to encrypt and decrypt data

64
New cards

Asymmetric Encryption

Uses a public and private key pair

65
New cards

Public Key

Key used to encrypt data

66
New cards

Private Key

Key used to decrypt data

67
New cards

Hashing

Converting data into a fixed-length value for integrity

68
New cards

Shift Cipher

Encryption by shifting letters

69
New cards

Caesar Cipher

Simple shift cipher named after Julius Caesar

70
New cards

Substitution Cipher

Replacing characters with other characters

71
New cards

Data at Rest

Stored data

72
New cards

Data in Transit

Data being transferred

73
New cards

Data in Use

Data actively being processed

74
New cards

MAC

Mandatory Access Control using sensitivity labels

75
New cards

DAC

Discretionary Access Control managed by the owner

76
New cards

RBAC

Role-Based Access Control using job roles

77
New cards

Digital Certificate

Verifies identity using encryption

78
New cards

Certificate Authority (CA)

Organization that issues digital certificates

79
New cards

Token

Temporary authentication credential

80
New cards

Business Continuity Plan

Ensures operations continue during disruptions

81
New cards

Disaster Recovery Plan

Restores systems after failure

82
New cards

Full Backup

Complete copy of all data

83
New cards

Incremental Backup

Copies only changed data

84
New cards

Differential Backup

Copies data changed since last full backup

85
New cards

Firewall

Filters traffic based on security rules

86
New cards

WAF

Web Application Firewall

87
New cards

Change Management

Controlling system changes to reduce risk

88
New cards

Security Awareness Training

Educating employees about security risks

89
New cards

CISO

Chief Information Security Officer

90
New cards

HTTPS

Secure web protocol using TLS

91
New cards

SSH

Secure remote access protocol

92
New cards

TLS

Encryption protocol for secure communication

93
New cards

WPA2/WPA3

Secure wireless encryption standards

94
New cards

WEP

Weak wireless encryption protocol

95
New cards

IDS

Intrusion Detection System that monitors traffic

96
New cards

IPS

Intrusion Prevention System that blocks threats

97
New cards

Strong Password

Long password with letters, numbers, and symbols

98
New cards

Patch Management

Updating systems to fix vulnerabilities

99
New cards

Tokenization

Replacing sensitive data with tokens

100
New cards

Data Masking

Hiding sensitive data