1/28
A comprehensive set of flashcards covering key terms and concepts in computer security, including definitions and clarifications.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
CIA
Confidentiality, Integrity, Availability.
Confidentiality
Prevention of unauthorized disclosure of information.
Integrity
Prevention of unauthorized modification of information.
Availability
Prevention of unauthorized withholding of information or resources.
Security Policy
Rules that determine which events are allowed or not allowed in the system.
Vulnerability
Weaknesses that allow harm to occur.
Intrusion
A successful event from the attacker exploiting a vulnerability.
Breach
Violation of the explicit or implicit security policy.
Risk
The possibility of a vulnerability being exploited.
Threat
Any person or event that threatens the CIA.
Countermeasures
Actions that reduce vulnerability.
CCPA
California Consumer Privacy Act; gives the right to know what information is being collected.
Criminal Groups
Organized crime entities seeking monetary gain.
Nation-State Actors
Governments conducting espionage and influence operations.
Hacktivists/Leakivists
Politically motivated hackers or leakers.
Ransomware
A type of malware that encrypts files to extort ransom.
Defense in Depth
Multi-layered approach to security protection.
Zero Trust
Security model that requires continual verification of trust.
Symmetric Key System
Encryption method using the same key for both encryption and decryption.
Asymmetric Key System
Encryption method using a pair of keys (public and private).
Cryptographic Hash Functions
Functions that convert data into a fixed size and are deterministic.
Hashing
A one-way process that verifies data integrity.
NIST Cyber Security Framework
Guides organizations in managing and mitigating cybersecurity risks.
Govern (NIST function)
Establish organizational risk management strategy and expectations.
Identify (NIST function)
Develop understanding of managing risks to assets and data.
Protect (NIST function)
Implement safeguards against identified risks.
Detect (NIST function)
Identify risks through continuous monitoring.
Respond (NIST function)
Actions taken when a cybersecurity incident occurs.
Recover (NIST function)
Activities to restore assets and operations after a cybersecurity incident.