Glossary_Foundations in Cybersecurity_C1 Flashcards

(55 cards)

1
Q

Adversarial artificial intelligence.
What is it?

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Antivirus software:

A

A software program used to prevent, detect, and eliminate malware and viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asset:

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business Email Compromise (BEC):

A

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud security:

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compliance:

A

The process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computer virus:

A

Malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality, means?

A

Only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA triad: What is it and what are the 3 components?

A

Confidentiality, integrity, availability
A model that helps inform how organizations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptographic attack:

A

An attack that affects secure forms of communication between a sender and intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybersecurity (or security):

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Database:

A

An organized collection of information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data point:

A

A specific piece of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hacker:

A

Any person who uses computers to gain access to computer systems, networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacktivist:

A

A person who uses hacking to achieve a political goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HIPAA

A

Health Insurance Portability and Accountability Act
A U.S. federal law established to protect patients’ health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Integrity

A

The idea that the data is correct, authentic, and reliable.
One of the CIA Triad components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Internal threat:

A

A current or former employee, external vendor, or trusted partner who poses a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IDS

A

Intrusion Detection System
An application that monitors system activity and alerts on possible intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Linux:

A

An open-source operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Malware:

A

Software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does NIST stand for?

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NIST (CSF):

A

National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF):
A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

24
Q

Network protocol analyser (packet sniffer):

A

A tool designed to capture and analyse data traffic within a network

25
Network security is the practice of:
The practice of keeping an organisation's network infrastructure secure from unauthorized access
26
OWASP
Open Web Application Security Project A non-profit organization focused on improving software security
27
Password attack:
An attempt to access password secured devices, systems, networks, or data
28
PII
Personally identifiable information Any information used to infer an individual’s identity
29
Order of volatility:
A sequence outlining the order of data that must be preserved from first to last
30
Phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software
31
Physical attack:
A security incident that affects not only digital but also physical environments where the incident is deployed
32
Physical social engineering:
An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location
33
Privacy protection:
The act of safeguarding personal information from unauthorized use
34
Programming:
A process that can be used to create a specific set of instructions for a computer to execute tasks
35
PHI: Protected health information
Information that relates to the past, present, or future physical or mental health or condition of an individual
36
Protecting and preserving evidence:
The process of properly working with fragile and volatile digital evidence
37
Security architecture:
A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats
38
Security controls:
Safeguards designed to reduce specific security risks
39
Security ethics:
Guidelines for making appropriate decisions as a security professional
40
Security frameworks:
Guidelines used for building plans to help mitigate risk and threats to data and privacy
41
Security governance:
Practices that help support, define, and direct security efforts of an organization
42
SIEM
Security information and event management An application that collects and analyzes log data to monitor critical activities in an organization
43
Security posture:
An organization’s ability to manage its defence of critical assets and data and react to change
44
SPII
Sensitive personally identifiable information A specific type of PII that falls under stricter handling guidelines
45
Social engineering:
A manipulation technique that exploits human error to gain private information, access, or valuables
46
Social media phishing:
A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack
47
Spear phishing:
A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source
48
SQL (pronounced sequel)
(Structured Query Language): A programming language used to create, interact with, and request information from a database
49
Supply-chain attack:
An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed
50
Threat:
Any circumstance or event that can negatively impact assets
51
Threat actor:
Any person or group who presents a security risk
52
USB baiting:
An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network
53
Virus:
Malicious code written to interfere with computer operations and cause damage to data and software
54
Vishing:
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
55
Watering hole attack:
A type of attack when a threat actor compromises a website frequently visited by a specific group of users