1/23
These flashcards encompass key concepts related to cyber security, including definitions of various attacks, security principles, and disaster recovery strategies.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Adware
Software that displays pop-up advertisements to users based on their activities.
Virus
Programs designed to spread from one system to another through self-replication and perform malicious activities.
Polymorphic viruses
Viruses that change their own code to avoid detection by antivirus scanners.
Worm
Malicious software that travels through a network without the assistance of a host application or user.
Spyware
Software installed on a user’s system without their consent, often used to collect information.
Trojan
Malicious software disguised as useful, tricking users into installing it.
Root kit
Programs that hide the infection of a system by embedding deeply in the operating system.
Logic bomb
Malicious code that remains dormant until triggered by a specific event.
Botnet
A network of compromised computers controlled by hackers to launch attacks.
Denial of Service (DoS) attack
An attack to make a computer's resources unavailable to users.
Man-in-the-middle attack
An attack where the attacker intercepts communication between a client and a server.
Shoulder surfing
Watching someone's keyboard or display to gain confidential information.
Phishing
Sending emails to trick users into revealing personal information.
Disaster Recovery Plan
A plan to reestablish services and minimize losses after a disaster.
Redundancy
Duplication of critical components to ensure operational continuity during a failure.
High Availability
Keeping services and systems operational during outages, aiming for 99.999% uptime.
Fault Tolerance
The ability of a system to continue functioning in the event of a component failure.
Incremental Backup
A backup that stores only the changes made since the last backup.
Class A Fire
Fires involving ordinary combustibles like wood and paper.
Authentication
The process of verifying the identity of a user or system.
Multifactor Authentication
Using two or more methods of authentication to verify a user’s identity.
Access Control Models
Frameworks that determine how permissions and access are granted to users.
Physical Security
Measures taken to protect buildings and physical assets from unauthorized access.
Environmental Controls
Measures implemented to maintain optimal environmental conditions for equipment.