Cybersecurity Flashcards
(432 cards)
Absolute file path
The full file path, which starts from the root
Access controls
Security controls that manage access, authorization, and accountability of information
Active packet sniffing
A type of attack where data packets are manipulated in transit
Address Resolution Protocol (ARP)
A network protocol used to determine the MAC address of the next router or device on the path
Advanced persistent threat (APT)
An instance when a threat actor maintains unauthorized access to a system for an extended period of time
Adversarial artificial intelligence (AI)
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Adware
A type of legitimate software that is sometimes used to display digital advertisements in applications
Algorithm
A set of rules used to solve a problem
Analysis
The investigation and validation of alerts
Angler phishing
A technique where attackers impersonate customer service representatives on social media
Anomaly-based analysis
A detection method that identifies abnormal behavior
Antivirus software
A software program used to prevent, detect, and eliminate malware and viruses
Application
A program that performs a specific task
Application programming interface (API) token
A small block of encrypted code that contains information about a user
Argument (Linux)
Specific information needed by a command
Argument (Python)
The data brought into a function when it is called
Array
A data type that stores data in a comma-separated ordered list
Assess
The fifth step of the NIST RMF that means to determine if established controls are implemented correctly
Asset
An item perceived as having value to an organization
Asset classification
The practice of labeling assets based on sensitivity and importance to an organization
Asset inventory
A catalog of assets that need to be protected
Asset management
The process of tracking assets and the risks that affect them
Asymmetric encryption
The use of a public and private key pair for encryption and decryption of data
Attack surface
All the potential vulnerabilities that a threat actor could exploit