Basics Flashcards
(121 cards)
antivirus software
The software program used to prevent, detect and eliminate malware and viruses
asset management
The process of tracking assets, and the risks that affect them
asset inventory
A catalog of assets that need to be protected
Biometrics
The unique physical characteristics that can be used to verify a persons identity
Business continuity
An organizations ability to maintain their everyday productivity by establishing risk disaster recovery plans.
Business continuity plan (BCP)
A documented outlines the procedures to sustain business operations during and after a significant disruption
Business email compromise (BEC)
a type of fishing attack, where a threat actor impersonates a known source to obtain financial advantage
Computer virus
Malicious code written to interfere with computer operations, and cause damage to data and software
Cyber security
The practice of ensuring confidentiality, integrity and availability information by protecting networks devices, people and data from unauthorized access or criminal exploitation
Data
Information that is translated, processed or stored by a computer
hacker
Any person who uses computers to gain access to computers, systems, networks or data
Hacktivist
any person who uses hacking to achieve a political goal
Linux
Open source operating system
Log
A record of events that occur within an organization system
malware
software designed to harm devices or networks
National Institute of standards and technology (NIST) cybersecurity framework (CSF)
A voluntary framework that consists of standards guidelines, and best practices to manage cybersecurity risk
operating system (OS)
The interface between computer hardware and the user
order of volatility
A sequence outlining the order of data that must be preserved from first to last
Packet sniffing
The practice of capturing and inspecting data packets across the network
phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software
playbook
a manual that provides details about any operational action
ransomware
A malicious attack or threat actors and krypton organizations, data, and demand payment to restore access
risk
Anything that can impact the confidentiality, integrity, or availability of an asset
risk mitigation
The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach