CyberSecurity Flashcards
(42 cards)
Threat
A potential danger to systems or data
Vulnerability
A weakness that can be exploited by a threat
Exploit
A method or tool used to take advantage of a vulnerability
Firewall
A network security device that monitors and filters incoming and outgoing traffic
Patch
A software update that fixes a bug or vulnerability
Phishing
A social engineering attack used to trick people into revealing sensitive info
Malware
Malicious software (e.g., viruses, worms, trojans)
Incident
A security event that compromises integrity, confidentiality, or availability
Mitigation
Steps taken to reduce or eliminate a security risk
Authentication
Verifying the identity of a user or system
Data breach
Unauthorized access to or disclosure of sensitive data
Zero-day exploit
An unknown vulnerability exploited before a fix is available
Ransomware
Malware that encrypts files and demands payment for release
Denial-of-Service (DoS)
Attack that makes a service unavailable by overwhelming it
Brute-force attack
Automated guessing of passwords or encryption keys
Command and control (C2)
A server that attackers use to communicate with compromised systems
Indicators of compromise (IOCs)
Signs that a system has been breached
Privilege escalation
Gaining higher access rights without authorization
Backdoor
A hidden method to access a system or software
Forensics
Investigation of systems to determine how a breach occurred
Follow-up
A review or continuation of a previous action or communication
Stakeholder
A person involved or affected by the outcome of a decision/project
Chain of command
The hierarchy of authority in an organization
Technical report
A formal document outlining an issue, analysis, or resolution in tech terms