Foundations of Cybersecurity

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Finals Flashcard Deck

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Goal Of Cybersecurity

Protect information, systems, and networks, from threats

2
New cards

PII

Social Security Numbers, full name, address, phone number, financial account numbers

3
New cards

Ransomware

Malware that locks of encrypts files until a ransom is paid

4
New cards

Phishing

Tricking users into giving sensitive information through fake emails, websites, or messages

5
New cards

Strong Passwords

Mix of uppercase, lowercase, numbers, and symbols. Avoid personal info or common words

6
New cards

Firewalls

Block unauthorized access to a network

7
New cards

Multi-Factor Authentification (MFA)

Requires two or more verification methods (password, code, fingerprint, etc.)

8
New cards

Password Storage

Safest method: use a password manager

9
New cards

Worms

Malware that self-replicates and spreads without user action

10
New cards

Social Engineering

Manipulating people into revealing confidential information

11
New cards

Principle of Least Privilege

Users should receive only the minimum access needed for their tasks

12
New cards

Suspicious Email Attachments

Delete or report unexpected attachments from unknown senders

13
New cards

Encryption

Converts data into unreadable form to protect it

14
New cards

DDoS Attack

Overwhelm a service with traffic to disrupt services

15
New cards

FERPA

Protects students' educational records

16
New cards

Digital Citizenship

Respecting privacy, behaving responsibly, and being kind online

17
New cards

Importance of backups

Protects against hardware failure, accidental deletion, and ransomware

18
New cards

Antivirus Software

Detects, prevents, and removes malware

19
New cards

Signs of a fraudulent website

Missing contact info, Strange or misspelled URLS

20
New cards

Trojan Malware

Appears legit but delivers harmful software once opened

21
New cards

Botnet Zombie

A computer controlled remotely as part of a network used for cyberattacks

22
New cards

Strongest Password Example

Complex and random: e.g., C!9v#A2m%7

23
New cards

Public Wi-Fi Safety

Use a VPN to encrypt your connection.

24
New cards

Security Analyst

Monitors networks for threats and suspicious activity

25
New cards

If Your Account Is Hacked

First step: Change your password immediately.

26
New cards

NIST

National Institute of Standards and Technology