Glossary Terms Flashcards
(421 cards)
Cybersecurity (or Security)
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation
Cloud security
The process of ensuring the assets stored in the cloud are properly configured, and access to those assets, is limited by authorized users
Internal threat
A current, or former employee, external vendor, or trusted partner, who poses our security risk
Network security
The practice of keeping in organizations network infrastructure secure from unauthorized access
Personally, identifiable information (PII)
Any information used to infer an individuals identity. includes: someone’s full name, date of birth, physical address, phone number, email address, Internet, protocol, IP address, and similar information 
Sensitive personally identifiable information (SPII)
A specific type of PII that falls under stricter handling guidelines. May include: Social Security numbers, medical, our financial information, and biometric data, such as facial recognition.
Technical skills
Skills that require knowledge of specific tools, procedures, and policies. Which include: programming, languages, secure, information, and event management (SIEM) tools, intrusion detection systems (IDSs), threat, landscape, knowledge, incident response.
Threat
Any circumstance, or event that can negatively impact assets
Threat actor
Any person or group represents a security risk
Transferable skills
Skills from other areas that can apply to different careers. Which includes: communication, collaboration, analysis, problem-solving.
Absolute file path
The full file path, which starts from the root
Access controls
Security controls that manage access, authorization, and accountability of information
Active packet sniffing
A type of attack where data packets are manipulated in transit
Address resolution protocol (ARP)
Network protocol used to determine the MAC ADDRESS OF THE NEXT ROUTER OR DEVICE TO TRAVERSE
Advanced persistent threat (APT)
An instance where a threat actor maintains unauthorized access to a system for an extended period of time
Adversarial artificial intelligence (AI)
A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently
Adware
A type of legitimate software that is sometimes used to display digital advertisements in applications
Algorithm
A set of rules to solve a problem
Analysis
The investigation and validation of alerts
Angler phishing
A technique where attackers impersonate customer service representatives on social media 
Anomaly-based analysis
Detection method that identifies abnormal behavior
Antivirus software
A software program used to prevent, detect, and illuminate malware and viruses
Application
A program that performs a specific task
Application programming interface (API) token
A small block of encrypted code that contains information about a user