General Terms Flashcards
Absolute file path?
The full file path, which starts from the root
Access Controls?
Security controls that manage access, authorization, and accountability of information
Active Packet sniffing?
A type of attack where data packets are manipulated in transit
Address Resolution Protocol (ARP)?
A network protocol used to determine the MAC address of the next router or device on the path
Advanced Persistent Threat (APT)?
An instance when a threat actor maintains unauthorized access to a system for an extended period of time
Adversarial Artificial Intelligence (AI)?
A technique that manipulates artificial
intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Adware?
A type of legitimate software that is sometimes used to display digital
advertisements in applications
Algorithm?
A set of rules used to solve a problem.
Analysis?
The investigation and validation of alerts
Angler Phishing?
A technique where attackers impersonate customer service
representatives on social media
Anomaly-based Analysis?
A detection method that identifies abnormal behavior
Antivirus Software?
A software program used to prevent, detect, and eliminate
malware and viruses
Application?
A program that performs a specific task
Application Programming Interface (API) token?
A small block of encrypted code
that contains information about a user
Argument (Linux) ?
Specific information needed by a command
Argument (Python)?
The data brought into a function when it is called
Array?
A data type that stores data in a comma-separated ordered list
Assess?
The fifth step of the NIST RMF that means to determine if established controls
are implemented correctly
Asset?
An item perceived as having value to an organization
Asset Classification?
The practice of labeling assets based on sensitivity and
importance to an organization
Asset Inventory?
A catalog of assets that need to be protected
Asset Management?
The process of tracking assets and the risks that affect them
Asymmetric encryption?
The use of a public and private key pair for encryption and
decryption of data
Attack Surface?
All the potential vulnerabilities that a threat actor could exploit