CyberSecurity Flashcards

(42 cards)

1
Q

Threat

A

A potential danger to systems or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

A weakness that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploit

A

A method or tool used to take advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall

A

A network security device that monitors and filters incoming and outgoing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Patch

A

A software update that fixes a bug or vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

A social engineering attack used to trick people into revealing sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware

A

Malicious software (e.g., viruses, worms, trojans)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Incident

A

A security event that compromises integrity, confidentiality, or availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mitigation

A

Steps taken to reduce or eliminate a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A

Verifying the identity of a user or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data breach

A

Unauthorized access to or disclosure of sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero-day exploit

A

An unknown vulnerability exploited before a fix is available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware

A

Malware that encrypts files and demands payment for release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial-of-Service (DoS)

A

Attack that makes a service unavailable by overwhelming it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Brute-force attack

A

Automated guessing of passwords or encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Command and control (C2)

A

A server that attackers use to communicate with compromised systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Indicators of compromise (IOCs)

A

Signs that a system has been breached

18
Q

Privilege escalation

A

Gaining higher access rights without authorization

19
Q

Backdoor

A

A hidden method to access a system or software

20
Q

Forensics

A

Investigation of systems to determine how a breach occurred

21
Q

Follow-up

A

A review or continuation of a previous action or communication

22
Q

Stakeholder

A

A person involved or affected by the outcome of a decision/project

23
Q

Chain of command

A

The hierarchy of authority in an organization

24
Q

Technical report

A

A formal document outlining an issue, analysis, or resolution in tech terms

25
Meeting agenda
A structured list of discussion topics for a meeting
26
Escalation
The process of raising an issue to a higher authority or level of support
27
Workload
The amount of work assigned to a person or team
28
Collaboration
Working together to achieve a common goal
29
Communication gap
A breakdown or misunderstanding in the exchange of information
30
Conflict resolution
The process of resolving disagreements effectively in the workplace
31
Risk assessment
Process of identifying, analyzing, and evaluating risks
32
Control
A safeguard or countermeasure to reduce risk
33
Policy
A formal rule or guideline that must be followed
34
Standard
Agreed level of quality or compliance (e.g., ISO 27001)
35
Audit
An official review to ensure compliance with standards or laws
36
Compliance
Adhering to laws, regulations, and internal policies
37
Non-compliance
Failure to follow required standards
38
Regulation
Official law or rule issued by an authority
39
Risk appetite
The level of risk an organization is willing to accept
40
Residual risk
Risk that remains after controls are implemented
41
Due diligence
Care taken to investigate before making a decision
42
Mitigation plan
Steps designed to reduce or control risks