Core Definitions Flashcards
(439 cards)
What is an Absolute file path?
The full file path, which starts from the root.
What are Access controls?
Security controls that manage access, authorization, and accountability of information.
What is Active packet sniffing?
A type of attack where data packets are manipulated in transit.
What is Address Resolution Protocol (ARP)?
A network protocol used to determine the MAC address of the next router or device on the path.
What is an Advanced persistent threat (APT)?
An instance when a threat actor maintains unauthorized access to a system for an extended period of time.
What is Adversarial artificial intelligence (AAI)?
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently.
What is Adware?
A type of legitimate software that is sometimes used to display digital advertisements in applications.
What is an Algorithm?
A set of rules used to solve a problem.
What is Analysis in cybersecurity?
The investigation and validation of alerts.
What is Angler phishing?
A technique where attackers impersonate customer service representatives on social media.
What is Anomaly-based analysis?
A detection method that identifies abnormal behavior.
What is Antivirus software?
A software program used to prevent, detect, and eliminate malware and viruses.
What is an Application?
A program that performs a specific task.
What is an Application programming interface (API) token?
A small block of encrypted code that contains information about a user.
What is an Argument in Linux?
Specific information needed by a command in the CLI.
What is an Argument in Python?
The data brought into a function when it is called.
What is an Array?
A data type that stores data in a comma-separated ordered list.
What does Assess mean in the NIST RMF?
The fifth step of the NIST RMF that means to determine if established controls are implemented correctly.
What is an Asset?
An item perceived as having value to an organization.
What is Asset classification?
The practice of labeling assets based on sensitivity and importance to an organization.
What is Asset inventory?
A catalog of assets that need to be protected.
What is Asset management?
The process of tracking assets and the risks that affect them.
What is Asymmetric encryption?
The use of a public and private key pair for encryption and decryption of data.
What is an Attack surface?
All the potential vulnerabilities that a threat actor could exploit.