Course 1, Week 1 Flashcards

1
Q

Cybersecurity

A

The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud Security

A

The practice of protecting cloud-based data, applications and infrastructure from cyber attacks and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internal Threat

A

A security risk that originates from within the targeted organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Security

A

Protects your network and data from breaches, intrusions and other threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Personally Identifiable Information (PII)

A

Any data that could potentially identify a specific individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Posture

A

An organization’s ability to protect its networks, information, and systems from threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sensitive Personally Identifiable Information (SPII)

A

A subset of PII, if lost, compromised, or disclosed without authorization, could result in substantial harm, embarrassment, inconvenience, or unfairness to an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technical Skills

A

A subset of hard skills, which are the knowledge or abilities needed to perform specific tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat

A

A malicious act that seeks to damage data, steal data, or disrupt digital life in general.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Actor

A

Individuals or groups that intentionally cause harm to digital devices or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transferable Skills

A

Skills you can transfer from one job to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adversarial Artificial Intelligence (AI)

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Email Compromise (BEC)

A

A spear phishing email scam that attempts to steal money or sensitive data from a business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

A type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer Code

A

Malicious code designed to cause damage, security breaches or other threats to application security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptographic Attack

A

Allows threat actors to bypass the security of a cryptographic system by finding weaknesses in its code, cipher, cryptographic protocol, or key management scheme.

17
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data.

18
Q

Malware

A

Software made to harm devices or networks.

19
Q

Password Attack

A

An attempt to access password secured devices, systems, networks, or data.

20
Q

Physical Attack

A

A security breach that impacts operations, damages property, or otherwise impacts the physical environment.

21
Q

Physical Social Engineering

A

A physical breach where an unauthorized person manipulates their way into a restricted or employee only authorized area through the use of social engineering tactics.

22
Q

Social Engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

23
Q

Social Media Phishing

A

Used by attackers seeking to steal personal data to sell on the dark web or to gain access, typically to financial accounts.

24
Q

Spear Phishing

A

Malicious email attack that targets a specific organization or individual.

25
Q

Supply-Chain Attack

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.

26
Q

USB Baiting

A

Leaving a piece of portable storage media such as a CD, laptop or USB in an open location to tempt a victim into seeing what’s on it.

27
Q

Vishing

A

Using electronic voice communication to trick people and get secret information or pretend to be someone they know.

28
Q

Watering Hole Attack

A

When an attacker tries to mess with a website that lots of people from a particular group like to visit.

29
Q

Whaling

A

A type of phishing attack targeting senior employees with the purpose of stealing money or information.