DEFINITIONS Flashcards

1
Q

Software Development Security

A

uses secure coding practices, which are set of recommended guidelines that are used to create secure applications and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

security architecture and engineering

A

optimizes data security by ensuring effective tools, systems and processes are in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security and risk management

A

defines security goals and objectives, risk mitigation, compliance, business continuity and the law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

security operations

A

conducting investigations and implementing preventative measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

security assessment and testing

A

conducting security control testing, collecting and analyzing data, and conducting security audits to monitor for risks, threats and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

identitity and access management

A

keeps data secure, by ensuring users follow established polices to control and manage physical assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

communication and network security

A

manage and secure physical networks and wireless communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat Actor

A

Any person or group that presents a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social media phishing

A

A threat actor collects detailed information about their target from social media sites. Then, initiates an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social engineering

A

is a manipulation technique that exploits human error to gain access to sensitive, private and valuable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical social engineering

A

A threat actor impersonates a employer, customer or vendor to gain unauthorized access to a physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spear phishing

A

a malicious email attach that targets a specific user or group of users. The email seems to originate from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

Software designed to harm devices and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus

A

a malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

the us of digital communication to trick a user or a group of users into revealing sensitive data or deploying a malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

USB baiting

A

A threat actor strategically leaves a malware usbstick for an employee to find and install, Unknowingly infect a network

17
Q

Ransomeware

A

-A malicious attack where a threat actor encrypts a organizations data and demands payment to restore access

18
Q

Vishing

A

The use of digital voice communication to gain access to sensitive information or to impersonate a known source

19
Q

Spyware

A

A malicious software installed on a users computer without their permission which is used to spy on or steal user data

20
Q

Worm

A

A malware that self–replicates, spreading across networks and infecting computers

21
Q

Business email compromise (BEC)

A

An attack in which a threat actor impersonated a know source to obtain financial advantage

22
Q

Watering hole attack

A

A threat actor targets a website that is frequently visited by a specific group of users

23
Q

Whaling

A

A threat actor targets a companies executive to gain access to sensitive data

24
Q

Adversarial artificial intelligence (AI

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

25
Q

Cryptographic attack

A

An attack that affects secure forms of communication between a sender and intended recipient